A Dynamic DDoS Protection Mechanism for WLAN based on SDS Architecture Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.5220/0006443400410047
The impact of distributed denial of service (DDoS) attacks has become more and more serious and widespread in wireless local area network (WLAN). Traditional DDoS protection mechanisms become less reliable and cannot easily adapt to the diverse types of DDoS attacks. Meanwhile, the emergence of software defined networking (SDN) has provided a new solution to solve the security problem in WLAN. In this paper, we propose a dynamic DDoS protection mechanism for WLAN based on software defined security, which is a branch of SDN architecture in the network security. When outer-net data flow streams into the network, the mechanism can judge the credibility of the flow by its self-detection function, and then it will deploy different security strategies to handle the data flow according to the credibility before server responds to it. The analysis and experiment show that compared with traditional DDoS protection mechanisms, the proposed mechanism is a priori detection method, and is more flexible and efficient.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5220/0006443400410047
- OA Status
- gold
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2599783915
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2599783915Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5220/0006443400410047Digital Object Identifier
- Title
-
A Dynamic DDoS Protection Mechanism for WLAN based on SDS ArchitectureWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
Heng He, Wei Xia, Yan Hu, Zhenyu Wang, Ji ZhangList of authors in order
- Landing page
-
https://doi.org/10.5220/0006443400410047Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5220/0006443400410047Direct OA link when available
- Concepts
-
Computer science, Denial-of-service attack, Mechanism (biology), Architecture, Computer network, World Wide Web, The Internet, Physics, Geography, Quantum mechanics, ArchaeologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2599783915 |
|---|---|
| doi | https://doi.org/10.5220/0006443400410047 |
| ids.doi | https://doi.org/10.5220/0006443400410047 |
| ids.mag | 2599783915 |
| ids.openalex | https://openalex.org/W2599783915 |
| fwci | 0.0 |
| type | article |
| title | A Dynamic DDoS Protection Mechanism for WLAN based on SDS Architecture |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 47 |
| biblio.first_page | 41 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9983999729156494 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T10714 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9983000159263611 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Software-Defined Networks and 5G |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6625871062278748 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C38822068 |
| concepts[1].level | 3 |
| concepts[1].score | 0.6603109836578369 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[1].display_name | Denial-of-service attack |
| concepts[2].id | https://openalex.org/C89611455 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5752585530281067 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q6804646 |
| concepts[2].display_name | Mechanism (biology) |
| concepts[3].id | https://openalex.org/C123657996 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5101668834686279 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q12271 |
| concepts[3].display_name | Architecture |
| concepts[4].id | https://openalex.org/C31258907 |
| concepts[4].level | 1 |
| concepts[4].score | 0.45817941427230835 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[4].display_name | Computer network |
| concepts[5].id | https://openalex.org/C136764020 |
| concepts[5].level | 1 |
| concepts[5].score | 0.16140177845954895 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[5].display_name | World Wide Web |
| concepts[6].id | https://openalex.org/C110875604 |
| concepts[6].level | 2 |
| concepts[6].score | 0.10435843467712402 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[6].display_name | The Internet |
| concepts[7].id | https://openalex.org/C121332964 |
| concepts[7].level | 0 |
| concepts[7].score | 0.06567680835723877 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[7].display_name | Physics |
| concepts[8].id | https://openalex.org/C205649164 |
| concepts[8].level | 0 |
| concepts[8].score | 0.055909961462020874 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1071 |
| concepts[8].display_name | Geography |
| concepts[9].id | https://openalex.org/C62520636 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[9].display_name | Quantum mechanics |
| concepts[10].id | https://openalex.org/C166957645 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q23498 |
| concepts[10].display_name | Archaeology |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6625871062278748 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[1].score | 0.6603109836578369 |
| keywords[1].display_name | Denial-of-service attack |
| keywords[2].id | https://openalex.org/keywords/mechanism |
| keywords[2].score | 0.5752585530281067 |
| keywords[2].display_name | Mechanism (biology) |
| keywords[3].id | https://openalex.org/keywords/architecture |
| keywords[3].score | 0.5101668834686279 |
| keywords[3].display_name | Architecture |
| keywords[4].id | https://openalex.org/keywords/computer-network |
| keywords[4].score | 0.45817941427230835 |
| keywords[4].display_name | Computer network |
| keywords[5].id | https://openalex.org/keywords/world-wide-web |
| keywords[5].score | 0.16140177845954895 |
| keywords[5].display_name | World Wide Web |
| keywords[6].id | https://openalex.org/keywords/the-internet |
| keywords[6].score | 0.10435843467712402 |
| keywords[6].display_name | The Internet |
| keywords[7].id | https://openalex.org/keywords/physics |
| keywords[7].score | 0.06567680835723877 |
| keywords[7].display_name | Physics |
| keywords[8].id | https://openalex.org/keywords/geography |
| keywords[8].score | 0.055909961462020874 |
| keywords[8].display_name | Geography |
| language | en |
| locations[0].id | doi:10.5220/0006443400410047 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ISME 2016 - Information Science and Management Engineering IV |
| locations[0].landing_page_url | https://doi.org/10.5220/0006443400410047 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101534722 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0041-2369 |
| authorships[0].author.display_name | Heng He |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[0].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[0].institutions[0].id | https://openalex.org/I43922553 |
| authorships[0].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Heng He |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[1].author.id | https://openalex.org/A5053624960 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-8491-6064 |
| authorships[1].author.display_name | Wei Xia |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[1].affiliations[0].raw_affiliation_string | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[1].institutions[0].id | https://openalex.org/I43922553 |
| authorships[1].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wei Xia |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | College of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[2].author.id | https://openalex.org/A5057374436 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-7663-3096 |
| authorships[2].author.display_name | Yan Hu |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[2].institutions[0].id | https://openalex.org/I43922553 |
| authorships[2].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Yan Hu |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[3].author.id | https://openalex.org/A5070533971 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3259-1226 |
| authorships[3].author.display_name | Zhenyu Wang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[3].institutions[0].id | https://openalex.org/I43922553 |
| authorships[3].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Zhenyu Wang |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[4].author.id | https://openalex.org/A5076242859 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-5563-5500 |
| authorships[4].author.display_name | Ji Zhang |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I43922553 |
| authorships[4].affiliations[0].raw_affiliation_string | School of Computer Science and Technology, Wuhan University of Science and Technology, China |
| authorships[4].institutions[0].id | https://openalex.org/I43922553 |
| authorships[4].institutions[0].ror | https://ror.org/00e4hrk88 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I43922553 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Wuhan University of Science and Technology |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Ji Zhang |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | School of Computer Science and Technology, Wuhan University of Science and Technology, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5220/0006443400410047 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Dynamic DDoS Protection Mechanism for WLAN based on SDS Architecture |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W4386482731, https://openalex.org/W4385302085, https://openalex.org/W2360429410, https://openalex.org/W2765763546, https://openalex.org/W4256682929, https://openalex.org/W335511927, https://openalex.org/W4239662759, https://openalex.org/W2471811227, https://openalex.org/W2217591390 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5220/0006443400410047 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ISME 2016 - Information Science and Management Engineering IV |
| best_oa_location.landing_page_url | https://doi.org/10.5220/0006443400410047 |
| primary_location.id | doi:10.5220/0006443400410047 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ISME 2016 - Information Science and Management Engineering IV |
| primary_location.landing_page_url | https://doi.org/10.5220/0006443400410047 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 48, 62, 75, 139 |
| abstract_inverted_index.by | 100 |
| abstract_inverted_index.in | 16, 56, 80 |
| abstract_inverted_index.is | 74, 138, 144 |
| abstract_inverted_index.of | 2, 5, 36, 77, 97 |
| abstract_inverted_index.on | 70 |
| abstract_inverted_index.to | 32, 51, 111, 117, 122 |
| abstract_inverted_index.we | 60 |
| abstract_inverted_index.SDN | 78 |
| abstract_inverted_index.The | 0, 124 |
| abstract_inverted_index.and | 12, 28, 104, 126, 143, 147 |
| abstract_inverted_index.can | 93 |
| abstract_inverted_index.for | 67 |
| abstract_inverted_index.has | 9, 46 |
| abstract_inverted_index.it. | 123 |
| abstract_inverted_index.its | 101 |
| abstract_inverted_index.new | 49 |
| abstract_inverted_index.the | 33, 40, 53, 81, 89, 91, 95, 98, 113, 118, 135 |
| abstract_inverted_index.DDoS | 23, 37, 64, 133 |
| abstract_inverted_index.WLAN | 68 |
| abstract_inverted_index.When | 84 |
| abstract_inverted_index.area | 19 |
| abstract_inverted_index.data | 86, 114 |
| abstract_inverted_index.flow | 87, 99, 115 |
| abstract_inverted_index.more | 11, 13, 145 |
| abstract_inverted_index.show | 128 |
| abstract_inverted_index.that | 129 |
| abstract_inverted_index.will | 106 |
| abstract_inverted_index.with | 131 |
| abstract_inverted_index.(SDN) | 45 |
| abstract_inverted_index.WLAN. | 57 |
| abstract_inverted_index.adapt | 31 |
| abstract_inverted_index.based | 69 |
| abstract_inverted_index.judge | 94 |
| abstract_inverted_index.local | 18 |
| abstract_inverted_index.solve | 52 |
| abstract_inverted_index.types | 35 |
| abstract_inverted_index.which | 73 |
| abstract_inverted_index.(DDoS) | 7 |
| abstract_inverted_index.become | 10, 26 |
| abstract_inverted_index.before | 120 |
| abstract_inverted_index.branch | 76 |
| abstract_inverted_index.cannot | 29 |
| abstract_inverted_index.denial | 4 |
| abstract_inverted_index.deploy | 107 |
| abstract_inverted_index.easily | 30 |
| abstract_inverted_index.handle | 112 |
| abstract_inverted_index.impact | 1 |
| abstract_inverted_index.paper, | 59 |
| abstract_inverted_index.priori | 140 |
| abstract_inverted_index.(WLAN). | 21 |
| abstract_inverted_index.In this | 58 |
| abstract_inverted_index.attacks | 8 |
| abstract_inverted_index.defined | 43 |
| abstract_inverted_index.diverse | 34 |
| abstract_inverted_index.dynamic | 63 |
| abstract_inverted_index.method, | 142 |
| abstract_inverted_index.network | 20, 82 |
| abstract_inverted_index.problem | 55 |
| abstract_inverted_index.propose | 61 |
| abstract_inverted_index.serious | 14 |
| abstract_inverted_index.service | 6 |
| abstract_inverted_index.then it | 105 |
| abstract_inverted_index.analysis | 125 |
| abstract_inverted_index.attacks. | 38 |
| abstract_inverted_index.compared | 130 |
| abstract_inverted_index.flexible | 146 |
| abstract_inverted_index.network, | 90 |
| abstract_inverted_index.proposed | 136 |
| abstract_inverted_index.provided | 47 |
| abstract_inverted_index.security | 54, 109 |
| abstract_inverted_index.software | 71 |
| abstract_inverted_index.solution | 50 |
| abstract_inverted_index.wireless | 17 |
| abstract_inverted_index.according | 116 |
| abstract_inverted_index.detection | 141 |
| abstract_inverted_index.different | 108 |
| abstract_inverted_index.emergence | 41 |
| abstract_inverted_index.function, | 103 |
| abstract_inverted_index.mechanism | 66, 92, 137 |
| abstract_inverted_index.outer-net | 85 |
| abstract_inverted_index.security. | 83 |
| abstract_inverted_index.Meanwhile, | 39 |
| abstract_inverted_index.efficient. | 148 |
| abstract_inverted_index.experiment | 127 |
| abstract_inverted_index.mechanisms | 25 |
| abstract_inverted_index.networking | 44 |
| abstract_inverted_index.protection | 24, 65 |
| abstract_inverted_index.strategies | 110 |
| abstract_inverted_index.Traditional | 22 |
| abstract_inverted_index.credibility | 96, 119 |
| abstract_inverted_index.distributed | 3 |
| abstract_inverted_index.of software | 42 |
| abstract_inverted_index.traditional | 132 |
| abstract_inverted_index.architecture | 79 |
| abstract_inverted_index.streams into | 88 |
| abstract_inverted_index.less reliable | 27 |
| abstract_inverted_index.and widespread | 15 |
| abstract_inverted_index.self-detection | 102 |
| abstract_inverted_index.server responds | 121 |
| abstract_inverted_index.defined security, | 72 |
| abstract_inverted_index.protection mechanisms, | 134 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.20792834 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |