{"id":"https://openalex.org/W2952067209","doi":"https://doi.org/10.1504/ijcse.2019.10021986","title":"Design of DDoS attack detection system based on intelligent bee colony algorithm","display_name":"Design of DDoS attack detection system based on intelligent bee colony algorithm","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2952067209","doi":"https://doi.org/10.1504/ijcse.2019.10021986","mag":"2952067209"},"language":"en","primary_location":{"id":"doi:10.1504/ijcse.2019.10021986","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcse.2019.10021986","pdf_url":null,"source":{"id":"https://openalex.org/S65043351","display_name":"International Journal of Computational Science and Engineering","issn_l":"1742-7185","issn":["1742-7185","1742-7193"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038705849","display_name":"Gongjun Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gongjun Yin","raw_affiliation_strings":["School of Computer Science, Sichuan University, No. 24, South Section, First Ring Road, Chengdu, Chengdu, 610065, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Sichuan University, No. 24, South Section, First Ring Road, Chengdu, Chengdu, 610065, Sichuan, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080029818","display_name":"Qiuting Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuting Tian","raw_affiliation_strings":["School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101014539","display_name":"Zhenxin Du","orcid":null},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenxin Du","raw_affiliation_strings":["School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101111973","display_name":"Xueshan Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueshan Yu","raw_affiliation_strings":["School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101744803","display_name":"Dezhi Han","orcid":"https://orcid.org/0000-0001-8861-5461"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dezhi Han","raw_affiliation_strings":["School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Shanghai Maritime University, 1550 Pudong Avenue, Pudong New Area, Shanghai, Shanghai, 201306, China","institution_ids":["https://openalex.org/I96733725"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038705849"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":0.5305,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6822113,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":"19","issue":"2","first_page":"223","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9401999711990356,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9401999711990356,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8931362628936768},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7884290218353271},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5303146243095398},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4945661723613739},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4426722526550293},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.43074214458465576},{"id":"https://openalex.org/keywords/artificial-bee-colony-algorithm","display_name":"Artificial bee colony algorithm","score":0.4243411719799042},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4156609773635864},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34516024589538574},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2932230234146118},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2868061065673828},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0791064202785492}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8931362628936768},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7884290218353271},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5303146243095398},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4945661723613739},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4426722526550293},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.43074214458465576},{"id":"https://openalex.org/C97133563","wikidata":"https://www.wikidata.org/wiki/Q4801057","display_name":"Artificial bee colony algorithm","level":2,"score":0.4243411719799042},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4156609773635864},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34516024589538574},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2932230234146118},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2868061065673828},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0791064202785492},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijcse.2019.10021986","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcse.2019.10021986","pdf_url":null,"source":{"id":"https://openalex.org/S65043351","display_name":"International Journal of Computational Science and Engineering","issn_l":"1742-7185","issn":["1742-7185","1742-7193"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5799999833106995,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2921433547","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2898696280","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W3091388705"],"abstract_inverted_index":{"As":[0],"the":[1,24,55,60,67,72,79,85,94,119,130,141],"large":[2],"data":[3,32,68,99,110],"applications":[4],"gain":[5],"popularity,":[6],"distributed":[7],"denial":[8],"of":[9,26,74,96,121],"service":[10],"(DDoS)":[11],"has":[12],"become":[13],"increasingly":[14],"a":[15,34],"serious":[16],"major":[17],"network":[18],"security":[19],"issue.":[20],"In":[21],"response":[22],"to":[23,65,71,91,103],"problem":[25],"DDoS":[27,35,97,108,134],"attack":[28,36,98,109],"detection":[29,37,123,135],"in":[30,101,124],"big":[31],"environment,":[33],"system":[38,53,126],"based":[39],"on":[40],"traffic":[41,56,69,80,122,143,147],"reduction":[42,57,144,148],"and":[43,59,84,105,133,146],"intelligent":[44,61],"artificial":[45,153],"bee":[46,62,154],"colony":[47,63,155],"algorithm":[48,58,64,131,145,149],"(EABC_elite)":[49],"is":[50,127],"designed.":[51],"The":[52,114],"combines":[54],"reduce":[66],"according":[70],"idea":[73],"abnormal":[75],"extraction.":[76],"It":[77],"uses":[78],"feature":[81],"distribution":[82],"entropy":[83],"generalised":[86],"likelihood":[87],"comparison":[88],"discrimination":[89],"factor":[90],"jointly":[92],"detect":[93],"characteristics":[95],"streams":[100],"order":[102],"quickly":[104],"efficiently":[106],"achieve":[107],"flow":[111],"accuracy":[112,136],"detection.":[113],"experimental":[115],"results":[116],"show":[117],"that":[118],"demand":[120],"this":[125],"greatly":[128],"reduced,":[129],"time-consuming":[132],"are":[137],"obviously":[138],"better":[139],"than":[140],"separate":[142],"combined":[150],"with":[151],"common":[152],"algorithm.":[156]},"counts_by_year":[{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
