{"id":"https://openalex.org/W2898053673","doi":"https://doi.org/10.1186/s13638-018-1267-2","title":"Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system","display_name":"Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system","publication_year":2018,"publication_date":"2018-10-22","ids":{"openalex":"https://openalex.org/W2898053673","doi":"https://doi.org/10.1186/s13638-018-1267-2","mag":"2898053673"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-018-1267-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-018-1267-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1267-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1267-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101498902","display_name":"Xingshuo An","orcid":"https://orcid.org/0000-0003-2347-3145"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xingshuo An","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036653695","display_name":"Jingtao Su","orcid":null},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingtao Su","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110259917","display_name":"Xing L\u00fc","orcid":null},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing L\u00fc","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105335899","display_name":"Fuhong Lin","orcid":"https://orcid.org/0000-0002-5287-5226"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuhong Lin","raw_affiliation_strings":["Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China","School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China"],"raw_orcid":"https://orcid.org/0000-0002-5287-5226","affiliations":[{"raw_affiliation_string":"Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China","institution_ids":["https://openalex.org/I92403157"]},{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, 100083, People\u2019s Republic of China","institution_ids":["https://openalex.org/I92403157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101498902"],"corresponding_institution_ids":["https://openalex.org/I92403157"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":4.7406,"has_fulltext":true,"cited_by_count":70,"citation_normalized_percentile":{"value":0.95330956,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.91221022605896},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8844171762466431},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7356767058372498},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6562401652336121},{"id":"https://openalex.org/keywords/apriori-algorithm","display_name":"Apriori algorithm","score":0.6281307935714722},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.59271240234375},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.5245999097824097},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.523832380771637},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.49831295013427734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48035869002342224},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4499739110469818},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32670509815216064},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13239869475364685},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10217171907424927},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08296859264373779},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.07849377393722534}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.91221022605896},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8844171762466431},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7356767058372498},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6562401652336121},{"id":"https://openalex.org/C81440476","wikidata":"https://www.wikidata.org/wiki/Q513511","display_name":"Apriori algorithm","level":3,"score":0.6281307935714722},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.59271240234375},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.5245999097824097},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.523832380771637},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.49831295013427734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48035869002342224},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4499739110469818},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32670509815216064},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13239869475364685},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10217171907424927},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08296859264373779},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.07849377393722534}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-018-1267-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-018-1267-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1267-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:eaaae08cb66d4a1792bdcc27bcff0d01","is_oa":true,"landing_page_url":"https://doaj.org/article/eaaae08cb66d4a1792bdcc27bcff0d01","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2018, Iss 1, Pp 1-9 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-018-1267-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-018-1267-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1267-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G5195505803","display_name":null,"funder_award_id":"2017YFC0820700","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"},{"id":"https://openalex.org/G5700074831","display_name":null,"funder_award_id":"KJ-17-101","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"}],"funders":[{"id":"https://openalex.org/F4320327655","display_name":"Foundation of Science and Technology on Information Assurance Laboratory","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2898053673.pdf","grobid_xml":"https://content.openalex.org/works/W2898053673.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W124114337","https://openalex.org/W1678884566","https://openalex.org/W1904483788","https://openalex.org/W2035203720","https://openalex.org/W2064421962","https://openalex.org/W2114623221","https://openalex.org/W2150847526","https://openalex.org/W2262390119","https://openalex.org/W2416799949","https://openalex.org/W2561635702","https://openalex.org/W2594536436","https://openalex.org/W2602407842","https://openalex.org/W2745223473","https://openalex.org/W2766889259","https://openalex.org/W2782713273","https://openalex.org/W2783842102","https://openalex.org/W2787467369","https://openalex.org/W2792628397","https://openalex.org/W2804937556","https://openalex.org/W2810012679","https://openalex.org/W2816853310","https://openalex.org/W2869015012","https://openalex.org/W2885906471","https://openalex.org/W2896252239"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2921433547","https://openalex.org/W4385302085","https://openalex.org/W2754163055","https://openalex.org/W4256682929","https://openalex.org/W4322008378","https://openalex.org/W2383770723"],"abstract_inverted_index":{"The":[0],"birth":[1],"of":[2,14,76,104,115],"fog":[3,21,55,96],"computing":[4,56],"has":[5],"given":[6],"rise":[7],"to":[8,27,43],"many":[9],"security":[10],"threats.":[11],"Distributed":[12],"denial":[13],"service":[15],"(DDoS)":[16],"attacks":[17,72],"by":[18],"intruders":[19],"on":[20,85],"nodes":[22,97],"will":[23],"cause":[24],"system":[25,33,59,117],"resources":[26],"be":[28,41,119],"illegally":[29],"appropriate.":[30],"Intrusion":[31],"detection":[32,58],"(IDS)":[34],"is":[35],"a":[36,54,80],"powerful":[37],"technology":[38],"that":[39,110],"can":[40,90,118],"used":[42],"resist":[44],"DDoS":[45,71,124],"attacks.":[46],"In":[47,62],"our":[48],"previous":[49],"research,":[50],"we":[51,65,108],"have":[52],"proposed":[53],"intrusion":[57],"(FC-IDS)":[60],"framework.":[61],"this":[63],"paper,":[64],"mainly":[66],"analyze":[67],"and":[68],"model":[69,83,89],"the":[70,74,93,102,111,116,123],"under":[73],"framework":[75],"FC-IDS.":[77],"We":[78],"propose":[79],"hypergraph":[81],"clustering":[82],"based":[84],"Apriori":[86],"algorithm.":[87],"This":[88],"effectively":[91,120],"describe":[92],"association":[94,125],"between":[95],"which":[98],"are":[99],"suffering":[100],"from":[101],"threat":[103],"DDoS.":[105],"Through":[106],"simulation,":[107],"verify":[109],"resource":[112],"utilization":[113],"rate":[114],"promoted":[121],"through":[122],"analysis.":[126]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
