{"id":"https://openalex.org/W4410832133","doi":"https://doi.org/10.32604/cmc.2025.061426","title":"TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection","display_name":"TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410832133","doi":"https://doi.org/10.32604/cmc.2025.061426"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.061426","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.061426","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011531786","display_name":"Hanqing Sun","orcid":"https://orcid.org/0009-0005-8083-5167"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hanqing Sun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085243168","display_name":"L. Xue","orcid":"https://orcid.org/0000-0002-0279-417X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xue Li","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114430051","display_name":"Qiyuan Fan","orcid":"https://orcid.org/0009-0000-6489-8161"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiyuan Fan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5037347113","display_name":"Puming Wang","orcid":"https://orcid.org/0000-0003-1261-8687"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Puming Wang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011531786"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.813,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.96713139,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"84","issue":"1","first_page":"1659","last_page":"1679"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7849299907684326},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7546427845954895},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6923787593841553},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.48523807525634766},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4555661678314209},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27893489599227905},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08785408735275269},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.07748523354530334},{"id":"https://openalex.org/keywords/cartography","display_name":"Cartography","score":0.07171496748924255},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.057352423667907715}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7849299907684326},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7546427845954895},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6923787593841553},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.48523807525634766},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4555661678314209},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27893489599227905},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08785408735275269},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.07748523354530334},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.07171496748924255},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.057352423667907715}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.061426","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.061426","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W861596422","https://openalex.org/W2007250389","https://openalex.org/W2024165284","https://openalex.org/W3095854260","https://openalex.org/W3204675283","https://openalex.org/W4290712489","https://openalex.org/W4295308370","https://openalex.org/W4387011098","https://openalex.org/W4387394267","https://openalex.org/W4392024490","https://openalex.org/W4401650574","https://openalex.org/W4402674150","https://openalex.org/W4404635780"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W2754163055"],"abstract_inverted_index":{"The":[0,41,69,142,173,207],"era":[1],"of":[2,36,101,109,198,227],"big":[3,49,57,116,123,139,170],"data":[4,50,58,117,140,154,171],"brings":[5],"new":[6],"challenges":[7],"for":[8,17,33],"information":[9,54,67,75],"network":[10,84,102,153,205],"systems":[11,96],"(INS),":[12],"simultaneously":[13],"offering":[14],"unprecedented":[15],"opportunities":[16],"advancing":[18],"intelligent":[19,53],"intrusion":[20,30,45,112,133,188],"detection":[21,31,46,113,134,237],"systems.":[22,68],"In":[23,79],"this":[24],"work,":[25],"we":[26,129],"propose":[27],"a":[28,48,98,110,122,131,138,156,160,196],"data-driven":[29],"system":[32,42,71,76,114,135,144,214,233],"Distributed":[34],"Denial":[35],"Service":[37],"(DDoS)":[38],"attack":[39],"detection.":[40,189],"focuses":[43],"on":[44,202],"from":[47,137],"perceptive.":[51],"As":[52],"processing":[55],"methods,":[56],"and":[59,118,150],"artificial":[60,119],"intelligence":[61,120],"have":[62,86],"been":[63],"widely":[64],"used":[65],"in":[66,77,94,155],"INS":[70,81,95],"is":[72,121,166,200],"an":[73,216],"important":[74],"cyberspace.":[78],"advanced":[80],"systems,":[82],"the":[83,91,107,127,179,187,192,211,225,228,230,241],"architectures":[85],"become":[87],"more":[88],"complex.":[89],"And":[90],"smart":[92],"devices":[93],"collect":[97],"large":[99],"scale":[100,226],"data.":[103],"How":[104],"to":[105,147,168,185],"improve":[106],"performance":[108],"complex":[111,151],"with":[115,178],"challenge.":[124],"To":[125,190],"address":[126],"problem,":[128],"design":[130],"novel":[132,161],"(IDS)":[136],"perspective.":[141],"IDS":[143,194,213,232,243],"uses":[145],"tensors":[146],"represent":[148],"large-scale":[149],"multi-source":[152],"unified":[157],"tensor.":[158],"Then,":[159],"tensor":[162],"decomposition":[163],"(TD)":[164],"method":[165,175,184],"developed":[167],"complete":[169,186],"mining.":[172],"TD":[174],"seamlessly":[176],"collaborates":[177],"XGBoost":[180],"(eXtreme":[181],"Gradient":[182],"Boosting)":[183],"verify":[191],"proposed":[193,212,231,242],"system,":[195],"series":[197],"experiments":[199],"conducted":[201],"two":[203],"real":[204],"datasets.":[206],"results":[208],"revealed":[209],"that":[210],"attained":[215],"impressive":[217],"accuracy":[218],"rate":[219],"over":[220],"98%.":[221],"Additionally,":[222],"by":[223],"altering":[224],"datasets,":[229],"still":[234],"maintains":[235],"excellent":[236],"performance,":[238],"which":[239],"demonstrates":[240],"system\u2019s":[244],"robustness.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
