{"id":"https://openalex.org/W4293582180","doi":"https://doi.org/10.1186/s13677-022-00308-3","title":"Low-rate Denial of Service attack detection method based on time-frequency characteristics","display_name":"Low-rate Denial of Service attack detection method based on time-frequency characteristics","publication_year":2022,"publication_date":"2022-08-30","ids":{"openalex":"https://openalex.org/W4293582180","doi":"https://doi.org/10.1186/s13677-022-00308-3"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-022-00308-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00308-3","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00308-3","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00308-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102913309","display_name":"Yu Fu","orcid":"https://orcid.org/0000-0001-7949-0556"},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Fu","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, 430033, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027211323","display_name":"Xueyuan Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I38756568","display_name":"Xinyang College of Agriculture and Forestry","ror":"https://ror.org/017t6fa07","country_code":"CN","type":"education","lineage":["https://openalex.org/I38756568"]},{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]},{"id":"https://openalex.org/I130750295","display_name":"Xinyang Normal University","ror":"https://ror.org/0190x2a66","country_code":"CN","type":"education","lineage":["https://openalex.org/I130750295"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueyuan Duan","raw_affiliation_strings":["College of Computer and Information Technology, Xinyang Normal University, Xinyang, 464000, China","Department of Information Security, Naval University of Engineering, Wuhan, 430033, China","Henan Key Laboratory of Analysis and Applications of Education Big Data, Xinyang, 464000, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Technology, Xinyang Normal University, Xinyang, 464000, China","institution_ids":["https://openalex.org/I130750295"]},{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, China","institution_ids":["https://openalex.org/I2800710378"]},{"raw_affiliation_string":"Henan Key Laboratory of Analysis and Applications of Education Big Data, Xinyang, 464000, China","institution_ids":["https://openalex.org/I38756568"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100366692","display_name":"Kun Wang","orcid":"https://orcid.org/0000-0002-9099-2781"},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]},{"id":"https://openalex.org/I38756568","display_name":"Xinyang College of Agriculture and Forestry","ror":"https://ror.org/017t6fa07","country_code":"CN","type":"education","lineage":["https://openalex.org/I38756568"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Wang","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, 430033, China","School of Mathematics and Information Engineering, Xinyang Vocational and Technical College, Xinyang, 464000, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, China","institution_ids":["https://openalex.org/I2800710378"]},{"raw_affiliation_string":"School of Mathematics and Information Engineering, Xinyang Vocational and Technical College, Xinyang, 464000, China","institution_ids":["https://openalex.org/I38756568"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365173","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-3395-6450"},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, 430033, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, 430033, China","institution_ids":["https://openalex.org/I2800710378"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102913309"],"corresponding_institution_ids":["https://openalex.org/I2800710378"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":2.9967,"has_fulltext":true,"cited_by_count":23,"citation_normalized_percentile":{"value":0.91462904,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7950652837753296},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.784371018409729},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7642643451690674},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5956878066062927},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.5482556819915771},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.47287294268608093},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45764631032943726},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.4561123847961426},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4282303750514984},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33809250593185425},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3007841110229492},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23759320378303528},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.1347241997718811},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09621912240982056}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7950652837753296},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.784371018409729},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7642643451690674},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5956878066062927},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.5482556819915771},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.47287294268608093},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45764631032943726},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.4561123847961426},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4282303750514984},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33809250593185425},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3007841110229492},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23759320378303528},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.1347241997718811},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09621912240982056},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-022-00308-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00308-3","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00308-3","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3e560ca96cf64c8f875e98fbbbbc4042","is_oa":true,"landing_page_url":"https://doaj.org/article/3e560ca96cf64c8f875e98fbbbbc4042","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-19 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-022-00308-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00308-3","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00308-3","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6200000047683716,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G1796300196","display_name":null,"funder_award_id":"2018YFB0804104","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4293582180.pdf","grobid_xml":"https://content.openalex.org/works/W4293582180.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1572793278","https://openalex.org/W1990818816","https://openalex.org/W2035536878","https://openalex.org/W2128599397","https://openalex.org/W2130583399","https://openalex.org/W2508641173","https://openalex.org/W2559655401","https://openalex.org/W2732451788","https://openalex.org/W2738679187","https://openalex.org/W2797742547","https://openalex.org/W2807469843","https://openalex.org/W2893843957","https://openalex.org/W2904266309","https://openalex.org/W2977635641","https://openalex.org/W2978116063","https://openalex.org/W3007603430","https://openalex.org/W3015586532","https://openalex.org/W3081430061","https://openalex.org/W3105750153","https://openalex.org/W3214428327","https://openalex.org/W4205140723","https://openalex.org/W4206826933","https://openalex.org/W4210793770"],"related_works":["https://openalex.org/W2039821316","https://openalex.org/W2989490741","https://openalex.org/W2388081684","https://openalex.org/W3092506759","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W120741642","https://openalex.org/W138569904"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"this":[2],"paper,":[3],"a":[4,146],"real":[5],"cloud":[6],"computing":[7],"platform-oriented":[8],"Low-rate":[9],"Denial":[10],"of":[11,21,62,167],"Service":[12],"(LDoS)":[13],"attack":[14,110,139],"detection":[15,78,154],"method":[16,134],"based":[17],"on":[18],"time-frequency":[19,90,125],"characteristics":[20,166],"traffic":[22,28,45],"data":[23,29,46,64,122,168,179],"is":[24,35,47,84,173],"proposed.":[25],"All":[26],"the":[27,32,38,43,54,58,67,72,77,88,94,100,108,113,116,120,124,132,138,142,164,178,181],"flowing":[30],"through":[31],"Web":[33],"server":[34],"acquired":[36],"by":[37,53,71],"collection":[39],"and":[40,57,98,119,150,158],"storage":[41],"system,":[42],"original":[44],"divided":[48],"into":[49],"multiple":[50],"flow":[51,68],"segments":[52,144],"preprocessing":[55],"module,":[56],"simple":[59],"statistical":[60,165],"features":[61,140],"several":[63],"packets":[65,169],"in":[66,93,123,141,145,180],"are":[69,170],"extracted":[70],"analysis":[73],"tool":[74],"to":[75,86,112,176,187],"form":[76],"sequence.":[79,102],"The":[80,103,127],"deep":[81],"neural":[82],"network":[83,189],"used":[85],"learn":[87],"potential":[89],"domain":[91],"connection":[92],"normal":[95],"feature":[96],"sequence":[97,118],"generate":[99],"reconstructed":[101,117],"discrimination":[104],"module":[105],"discriminates":[106],"against":[107],"LDoS":[109,160],"according":[111],"difference":[114],"between":[115],"input":[121],"domain.":[126],"experimental":[128],"results":[129],"show":[130],"that":[131],"proposed":[133],"can":[135,151,184],"accurately":[136],"detect":[137],"stream":[143],"very":[147],"short":[148],"time,":[149],"achieve":[152],"high":[153],"accuracy":[155],"for":[156],"complex":[157],"diverse":[159],"attacks.":[161],"Because":[162],"only":[163],"used,":[171],"it":[172],"not":[174],"necessary":[175],"analyze":[177],"packets,":[182],"which":[183],"be":[185],"adapted":[186],"different":[188],"environments.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
