{"id":"https://openalex.org/W4409887247","doi":"https://doi.org/10.1177/09266801241305972","title":"Statistical slice-level analysis for online detection of distributed denial-of-service (DDoS) attacks in network slicing environments","display_name":"Statistical slice-level analysis for online detection of distributed denial-of-service (DDoS) attacks in network slicing environments","publication_year":2024,"publication_date":"2024-12-26","ids":{"openalex":"https://openalex.org/W4409887247","doi":"https://doi.org/10.1177/09266801241305972"},"language":"en","primary_location":{"id":"doi:10.1177/09266801241305972","is_oa":false,"landing_page_url":"https://doi.org/10.1177/09266801241305972","pdf_url":null,"source":{"id":"https://openalex.org/S133922704","display_name":"Journal of High Speed Networks","issn_l":"0926-6801","issn":["0926-6801","1875-8940"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of High Speed Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022915770","display_name":"Suadad S. Mahdi","orcid":"https://orcid.org/0000-0002-9801-6793"},"institutions":[{"id":"https://openalex.org/I166455938","display_name":"University of Babylon","ror":"https://ror.org/0170edc15","country_code":"IQ","type":"education","lineage":["https://openalex.org/I166455938"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Suadad S Mahdi","raw_affiliation_strings":["College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil<?show [AQ ID=AQ9]?>, 51002, Iraq<?show [AQ ID=AQ1 POS=12pt]?>","College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil, 51002, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil<?show [AQ ID=AQ9]?>, 51002, Iraq<?show [AQ ID=AQ1 POS=12pt]?>","institution_ids":["https://openalex.org/I166455938"]},{"raw_affiliation_string":"College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil, 51002, Iraq","institution_ids":["https://openalex.org/I166455938"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052981515","display_name":"Alharith A. Abdullah","orcid":null},"institutions":[{"id":"https://openalex.org/I166455938","display_name":"University of Babylon","ror":"https://ror.org/0170edc15","country_code":"IQ","type":"education","lineage":["https://openalex.org/I166455938"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Alharith A Abdullah","raw_affiliation_strings":["College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil<?show [AQ ID=AQ9]?>, 51002, Iraq<?show [AQ ID=AQ1 POS=12pt]?>","College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil, 51002, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-1485-2461","affiliations":[{"raw_affiliation_string":"College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil<?show [AQ ID=AQ9]?>, 51002, Iraq<?show [AQ ID=AQ1 POS=12pt]?>","institution_ids":["https://openalex.org/I166455938"]},{"raw_affiliation_string":"College of Information Technology, University of Babylon, Hilla, Al-Najaf Road, P.O.B. 4, Babil, 51002, Iraq","institution_ids":["https://openalex.org/I166455938"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052981515"],"corresponding_institution_ids":["https://openalex.org/I166455938"],"apc_list":null,"apc_paid":null,"fwci":0.3208,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65681291,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"31","issue":"2","first_page":"145","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9474823474884033},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8522405624389648},{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.7044240832328796},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5954481959342957},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5580976605415344},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5080761909484863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4461452066898346},{"id":"https://openalex.org/keywords/statistical-analysis","display_name":"Statistical analysis","score":0.42561689019203186},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24346604943275452},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20545026659965515},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1803136169910431},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.11069419980049133},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06511056423187256}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9474823474884033},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8522405624389648},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.7044240832328796},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5954481959342957},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5580976605415344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5080761909484863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4461452066898346},{"id":"https://openalex.org/C2986587452","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical analysis","level":2,"score":0.42561689019203186},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24346604943275452},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20545026659965515},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1803136169910431},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.11069419980049133},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06511056423187256}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/09266801241305972","is_oa":false,"landing_page_url":"https://doi.org/10.1177/09266801241305972","pdf_url":null,"source":{"id":"https://openalex.org/S133922704","display_name":"Journal of High Speed Networks","issn_l":"0926-6801","issn":["0926-6801","1875-8940"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of High Speed Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2093862276","https://openalex.org/W2965107301","https://openalex.org/W2969501197","https://openalex.org/W3006376159","https://openalex.org/W3010676594","https://openalex.org/W3121731896","https://openalex.org/W4205618214","https://openalex.org/W4221146354","https://openalex.org/W4224438381","https://openalex.org/W4281685443","https://openalex.org/W4282933834","https://openalex.org/W4289655052","https://openalex.org/W4294187928","https://openalex.org/W4307158956","https://openalex.org/W4378364326","https://openalex.org/W4380087715","https://openalex.org/W4382702754","https://openalex.org/W4386473332","https://openalex.org/W4391621218","https://openalex.org/W4392399567","https://openalex.org/W4399403138"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Network":[0],"slicing":[1],"(NS)":[2],"is":[3,101],"a":[4,26,146,157],"technique":[5],"that":[6,80,100,117,180],"enables":[7],"network":[8,29,105,126,140],"operators":[9],"to":[10,66,103,124,187],"create":[11],"multiple":[12,76],"virtual":[13],"networks,":[14],"each":[15],"customized":[16],"for":[17,139],"specific":[18,62,158],"clients,":[19],"services,":[20],"or":[21,78],"applications,":[22],"while":[23],"still":[24],"utilizing":[25],"shared":[27],"physical":[28],"infrastructure.":[30],"Although":[31],"this":[32],"approach":[33],"provides":[34],"benefits":[35],"in":[36,50,128,151,193],"terms":[37],"of":[38,53,135,149],"resource":[39],"usage":[40],"and":[41,121,167,185],"flexibility,":[42],"it":[43],"also":[44],"introduces":[45],"new":[46],"security":[47,88],"risks,":[48],"particularly":[49],"the":[51,67,87,93,133,136,142,168,181],"form":[52],"DDoS":[54,108,153],"attacks.":[55,109],"These":[56,177],"attacks":[57,154,188],"can":[58,183,191],"be":[59],"targeted":[60],"at":[61,165,174],"slices,":[63,72,141],"causing":[64],"disruptions":[65],"services":[68],"provided":[69],"by":[70,91],"those":[71,83],"which":[73,190],"may":[74],"impact":[75],"clients":[77],"applications":[79],"rely":[81],"on":[82,114,132],"services.":[84],"To":[85],"mitigate":[86],"risks":[89],"posed":[90],"NS,":[92],"paper":[94],"proposes":[95],"an":[96],"intrusion":[97],"detection":[98,161],"system":[99,112,144,182],"designed":[102],"safeguard":[104],"slices":[106],"from":[107],"The":[110,160],"proposed":[111,143],"relies":[113],"statistical":[115],"methods":[116],"use":[118],"joint":[119],"entropy":[120],"dynamic":[122],"thresholds":[123],"analyze":[125],"traffic":[127],"real":[129],"time.":[130],"Based":[131],"findings":[134],"testbed":[137],"conducted":[138],"exhibited":[145],"remarkable":[147],"level":[148],"effectiveness":[150],"identifying":[152],"directed":[155],"targeting":[156],"slice.":[159],"rate":[162,170],"was":[163,171],"recorded":[164],"99%,":[166],"delay":[169],"extremely":[172],"low":[173],"0.32":[175],"s.":[176],"results":[178],"imply":[179],"recognize":[184],"respond":[186],"swiftly,":[189],"aid":[192],"swiftly":[194],"mitigating":[195],"potential":[196],"threats.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
