{"id":"https://openalex.org/W2888510844","doi":"https://doi.org/10.3390/fi10090083","title":"A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller","display_name":"A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller","publication_year":2018,"publication_date":"2018-08-23","ids":{"openalex":"https://openalex.org/W2888510844","doi":"https://doi.org/10.3390/fi10090083","mag":"2888510844"},"language":"en","primary_location":{"id":"doi:10.3390/fi10090083","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10090083","pdf_url":"https://www.mdpi.com/1999-5903/10/9/83/pdf","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/10/9/83/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043838998","display_name":"Wentao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I174442536","display_name":"South Central University for Nationalities","ror":"https://ror.org/03d7sax13","country_code":"CN","type":"education","lineage":["https://openalex.org/I174442536"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wentao Wang","raw_affiliation_strings":["College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China","institution_ids":["https://openalex.org/I174442536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023952633","display_name":"Xuan Ke","orcid":"https://orcid.org/0000-0001-5485-3664"},"institutions":[{"id":"https://openalex.org/I174442536","display_name":"South Central University for Nationalities","ror":"https://ror.org/03d7sax13","country_code":"CN","type":"education","lineage":["https://openalex.org/I174442536"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuan Ke","raw_affiliation_strings":["College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China","institution_ids":["https://openalex.org/I174442536"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101817363","display_name":"Lingxia Wang","orcid":"https://orcid.org/0009-0006-0507-465X"},"institutions":[{"id":"https://openalex.org/I174442536","display_name":"South Central University for Nationalities","ror":"https://ror.org/03d7sax13","country_code":"CN","type":"education","lineage":["https://openalex.org/I174442536"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingxia Wang","raw_affiliation_strings":["College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China","institution_ids":["https://openalex.org/I174442536"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023952633"],"corresponding_institution_ids":["https://openalex.org/I174442536"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.7587,"has_fulltext":true,"cited_by_count":26,"citation_normalized_percentile":{"value":0.86666765,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"10","issue":"9","first_page":"83","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8882540464401245},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8734927177429199},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6581557393074036},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5441906452178955},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.5381286144256592},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5004336833953857},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.462639719247818},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37740442156791687},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2195391058921814},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15425342321395874},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08303654193878174}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8882540464401245},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8734927177429199},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6581557393074036},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5441906452178955},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.5381286144256592},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5004336833953857},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.462639719247818},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37740442156791687},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2195391058921814},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15425342321395874},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08303654193878174},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi10090083","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10090083","pdf_url":"https://www.mdpi.com/1999-5903/10/9/83/pdf","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:10:y:2018:i:9:p:83-:d:165325","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/10/9/83/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:fb09ce4c91ac45e8be2b986fbbaa3265","is_oa":true,"landing_page_url":"https://doaj.org/article/fb09ce4c91ac45e8be2b986fbbaa3265","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 10, Iss 9, p 83 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/10/9/83/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/fi10090083","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi10090083","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10090083","pdf_url":"https://www.mdpi.com/1999-5903/10/9/83/pdf","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.44999998807907104}],"awards":[],"funders":[{"id":"https://openalex.org/F4320330673","display_name":"South-Central University for Nationalities","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2888510844.pdf","grobid_xml":"https://content.openalex.org/works/W2888510844.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W29129180","https://openalex.org/W1577498723","https://openalex.org/W1680354096","https://openalex.org/W1971353559","https://openalex.org/W2017524370","https://openalex.org/W2029025881","https://openalex.org/W2035536878","https://openalex.org/W2038527861","https://openalex.org/W2063625716","https://openalex.org/W2093862276","https://openalex.org/W2111942706","https://openalex.org/W2119227347","https://openalex.org/W2136451165","https://openalex.org/W2136965883","https://openalex.org/W2163375756","https://openalex.org/W2219388052","https://openalex.org/W2230781190","https://openalex.org/W2308983626","https://openalex.org/W2378672418","https://openalex.org/W2385231574","https://openalex.org/W2397943301","https://openalex.org/W2484286059","https://openalex.org/W2519428799","https://openalex.org/W2573148741","https://openalex.org/W2768411980","https://openalex.org/W3008083157","https://openalex.org/W6659510661","https://openalex.org/W6712744409","https://openalex.org/W6721786724","https://openalex.org/W6732317652","https://openalex.org/W6773887740","https://openalex.org/W7006074722"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W4239662759","https://openalex.org/W2039821316","https://openalex.org/W2388081684","https://openalex.org/W3093744786"],"abstract_inverted_index":{"A":[0],"data":[1,19,25,92,96,108],"center":[2,97],"network":[3,70,75,98],"is":[4,72,145],"vulnerable":[5],"to":[6,88,119,125,147],"suffer":[7],"from":[8],"concealed":[9],"low-rate":[10],"distributed":[11],"denial":[12],"of":[13,24,38,42,107,151],"service":[14],"(L-DDoS)":[15],"attacks":[16,48,128],"because":[17],"its":[18],"flow":[20,26],"has":[21],"the":[22,36,81,95,101,115,134,152,156,161],"characteristics":[23],"delay,":[27],"diversity,":[28],"and":[29,59,90,99,110,160],"synchronization.":[30],"Several":[31],"studies":[32],"have":[33],"proposed":[34],"addressing":[35],"detection":[37,138],"L-DDoS":[39,47,66,127],"attacks,":[40],"most":[41],"them":[43,113,148],"are":[44],"only":[45],"detect":[46,126],"at":[49,129],"a":[50,73,121],"fixed":[51],"rate.":[52],"These":[53],"methods":[54],"cause":[55],"low":[56],"true":[57,153],"positive":[58,62,154,158],"high":[60],"false":[61,157],"in":[63,149],"detecting":[64],"multi-rate":[65],"attacks.":[67],"Software":[68],"defined":[69],"(SDN)":[71],"new":[74],"architecture":[76],"that":[77],"can":[78],"centrally":[79],"control":[80],"network.":[82],"We":[83],"use":[84],"an":[85],"SDN":[86],"controller":[87],"collect":[89],"analyze":[91],"packets":[93],"entering":[94],"calculate":[100],"Renyi":[102],"entropies":[103],"base":[104],"on":[105],"IP":[106],"packets,":[109],"then":[111],"combine":[112],"with":[114,133],"hidden":[116],"Markov":[117],"model":[118,123],"get":[120],"probability":[122],"HMM-R":[124,144],"different":[130],"rates.":[131],"Compared":[132],"four":[135],"common":[136],"attack":[137],"algorithms":[139],"(KNN,":[140],"SVM,":[141],"SOM,":[142],"BP),":[143],"superior":[146],"terms":[150],"rate,":[155,159],"adaptivity.":[162]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
