Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1016/j.procs.2023.03.103
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4*1038 unique IP addresses of devices in the network. IPv6 needed a number of protocols such as the Address Auto-configuration scheme and Internet Control Message Protocol (ICMPv6), IPv6 is vulnerable to numerous attacks such as Denial of Service (DoS) and Distributed Denial of Service (DDoS), DDoS is one of the most dangerous attacks carried out through ICMPv6 messages that impose security and pecuniary implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting ICMPv6 DDoS attacks using a modified Flower Pollination Algorithm (MFPA). The main purpose of the proposed method, first MFPA is to select the most relevant features from the ICMPv6 dataset to the detect ICMPv6 DDoS attacks. Second, an enhanced detecting DDoS flooding attacks model based on a multi-objective FPA has proposed. The results show that the first proposed method (MFPA) achieved the best accuracy equal to 97.96% with 10 features and the second proposed method Multi-Objective FPA achieved the best accuracy 97.01% with 5 features.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.procs.2023.03.103
- OA Status
- diamond
- Cited By
- 7
- References
- 28
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4366149829
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4366149829Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.procs.2023.03.103Digital Object Identifier
- Title
-
Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly DetectionWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-01-01Full publication date if available
- Authors
-
Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Hussam Mohammed Jasim, Nor Samsiah SaniList of authors in order
- Landing page
-
https://doi.org/10.1016/j.procs.2023.03.103Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.procs.2023.03.103Direct OA link when available
- Concepts
-
Denial-of-service attack, Computer science, Application layer DDoS attack, Flooding (psychology), Intrusion detection system, IPv6, Network security, Trinoo, Protocol (science), Computer network, Computer security, Anomaly detection, Algorithm, The Internet, Data mining, Psychotherapist, Alternative medicine, Psychology, Medicine, World Wide Web, PathologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
7Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 4, 2024: 3Per-year citation counts (last 5 years)
- References (count)
-
28Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4366149829 |
|---|---|
| doi | https://doi.org/10.1016/j.procs.2023.03.103 |
| ids.doi | https://doi.org/10.1016/j.procs.2023.03.103 |
| ids.openalex | https://openalex.org/W4366149829 |
| fwci | 3.07686604 |
| type | article |
| title | Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection |
| biblio.issue | |
| biblio.volume | 220 |
| biblio.last_page | 781 |
| biblio.first_page | 776 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9979000091552734 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T12326 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9972000122070312 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1708 |
| topics[2].subfield.display_name | Hardware and Architecture |
| topics[2].display_name | Network Packet Processing and Optimization |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38822068 |
| concepts[0].level | 3 |
| concepts[0].score | 0.8934571743011475 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[0].display_name | Denial-of-service attack |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8833092451095581 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C120865594 |
| concepts[2].level | 4 |
| concepts[2].score | 0.5690887570381165 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[2].display_name | Application layer DDoS attack |
| concepts[3].id | https://openalex.org/C186594467 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5689433217048645 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1429176 |
| concepts[3].display_name | Flooding (psychology) |
| concepts[4].id | https://openalex.org/C35525427 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5651489496231079 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[4].display_name | Intrusion detection system |
| concepts[5].id | https://openalex.org/C84555802 |
| concepts[5].level | 3 |
| concepts[5].score | 0.521203875541687 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2551624 |
| concepts[5].display_name | IPv6 |
| concepts[6].id | https://openalex.org/C182590292 |
| concepts[6].level | 2 |
| concepts[6].score | 0.501197338104248 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[6].display_name | Network security |
| concepts[7].id | https://openalex.org/C43639116 |
| concepts[7].level | 5 |
| concepts[7].score | 0.5009965896606445 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7843050 |
| concepts[7].display_name | Trinoo |
| concepts[8].id | https://openalex.org/C2780385302 |
| concepts[8].level | 3 |
| concepts[8].score | 0.4933299124240875 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q367158 |
| concepts[8].display_name | Protocol (science) |
| concepts[9].id | https://openalex.org/C31258907 |
| concepts[9].level | 1 |
| concepts[9].score | 0.49318569898605347 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[9].display_name | Computer network |
| concepts[10].id | https://openalex.org/C38652104 |
| concepts[10].level | 1 |
| concepts[10].score | 0.43667319416999817 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[10].display_name | Computer security |
| concepts[11].id | https://openalex.org/C739882 |
| concepts[11].level | 2 |
| concepts[11].score | 0.41787663102149963 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[11].display_name | Anomaly detection |
| concepts[12].id | https://openalex.org/C11413529 |
| concepts[12].level | 1 |
| concepts[12].score | 0.40139126777648926 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[12].display_name | Algorithm |
| concepts[13].id | https://openalex.org/C110875604 |
| concepts[13].level | 2 |
| concepts[13].score | 0.385009229183197 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[13].display_name | The Internet |
| concepts[14].id | https://openalex.org/C124101348 |
| concepts[14].level | 1 |
| concepts[14].score | 0.3589784801006317 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[14].display_name | Data mining |
| concepts[15].id | https://openalex.org/C542102704 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q183257 |
| concepts[15].display_name | Psychotherapist |
| concepts[16].id | https://openalex.org/C204787440 |
| concepts[16].level | 2 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[16].display_name | Alternative medicine |
| concepts[17].id | https://openalex.org/C15744967 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[17].display_name | Psychology |
| concepts[18].id | https://openalex.org/C71924100 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[18].display_name | Medicine |
| concepts[19].id | https://openalex.org/C136764020 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[19].display_name | World Wide Web |
| concepts[20].id | https://openalex.org/C142724271 |
| concepts[20].level | 1 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[20].display_name | Pathology |
| keywords[0].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[0].score | 0.8934571743011475 |
| keywords[0].display_name | Denial-of-service attack |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8833092451095581 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/application-layer-ddos-attack |
| keywords[2].score | 0.5690887570381165 |
| keywords[2].display_name | Application layer DDoS attack |
| keywords[3].id | https://openalex.org/keywords/flooding |
| keywords[3].score | 0.5689433217048645 |
| keywords[3].display_name | Flooding (psychology) |
| keywords[4].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[4].score | 0.5651489496231079 |
| keywords[4].display_name | Intrusion detection system |
| keywords[5].id | https://openalex.org/keywords/ipv6 |
| keywords[5].score | 0.521203875541687 |
| keywords[5].display_name | IPv6 |
| keywords[6].id | https://openalex.org/keywords/network-security |
| keywords[6].score | 0.501197338104248 |
| keywords[6].display_name | Network security |
| keywords[7].id | https://openalex.org/keywords/trinoo |
| keywords[7].score | 0.5009965896606445 |
| keywords[7].display_name | Trinoo |
| keywords[8].id | https://openalex.org/keywords/protocol |
| keywords[8].score | 0.4933299124240875 |
| keywords[8].display_name | Protocol (science) |
| keywords[9].id | https://openalex.org/keywords/computer-network |
| keywords[9].score | 0.49318569898605347 |
| keywords[9].display_name | Computer network |
| keywords[10].id | https://openalex.org/keywords/computer-security |
| keywords[10].score | 0.43667319416999817 |
| keywords[10].display_name | Computer security |
| keywords[11].id | https://openalex.org/keywords/anomaly-detection |
| keywords[11].score | 0.41787663102149963 |
| keywords[11].display_name | Anomaly detection |
| keywords[12].id | https://openalex.org/keywords/algorithm |
| keywords[12].score | 0.40139126777648926 |
| keywords[12].display_name | Algorithm |
| keywords[13].id | https://openalex.org/keywords/the-internet |
| keywords[13].score | 0.385009229183197 |
| keywords[13].display_name | The Internet |
| keywords[14].id | https://openalex.org/keywords/data-mining |
| keywords[14].score | 0.3589784801006317 |
| keywords[14].display_name | Data mining |
| language | en |
| locations[0].id | doi:10.1016/j.procs.2023.03.103 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120348307 |
| locations[0].source.issn | 1877-0509 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1877-0509 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Procedia Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Procedia Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1016/j.procs.2023.03.103 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5050294360 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8460-9662 |
| authorships[0].author.display_name | Adnan Hasan Bdair AIghuraibawi |
| authorships[0].countries | IQ, MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I139322472 |
| authorships[0].affiliations[0].raw_affiliation_string | National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang, 11800, Malaysia |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I2802535771 |
| authorships[0].affiliations[1].raw_affiliation_string | Baghdad College of Economic Sciences University, Baghdad, Iraq |
| authorships[0].institutions[0].id | https://openalex.org/I2802535771 |
| authorships[0].institutions[0].ror | https://ror.org/026dp8058 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I2802535771 |
| authorships[0].institutions[0].country_code | IQ |
| authorships[0].institutions[0].display_name | Baghdad College of Economic Sciences University |
| authorships[0].institutions[1].id | https://openalex.org/I139322472 |
| authorships[0].institutions[1].ror | https://ror.org/02rgb2k63 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I139322472 |
| authorships[0].institutions[1].country_code | MY |
| authorships[0].institutions[1].display_name | Universiti Sains Malaysia |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Adnan Hasan Bdair AIghuraibawi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Baghdad College of Economic Sciences University, Baghdad, Iraq, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang, 11800, Malaysia |
| authorships[1].author.id | https://openalex.org/A5042044177 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Selvakumar Manickam |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I139322472 |
| authorships[1].affiliations[0].raw_affiliation_string | National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang, 11800, Malaysia |
| authorships[1].institutions[0].id | https://openalex.org/I139322472 |
| authorships[1].institutions[0].ror | https://ror.org/02rgb2k63 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I139322472 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | Universiti Sains Malaysia |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Selvakumar Manickam |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang, 11800, Malaysia |
| authorships[2].author.id | https://openalex.org/A5051571958 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3061-5837 |
| authorships[2].author.display_name | Rosni Abdullah |
| authorships[2].countries | MY |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I139322472 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Sciences, Universiti Sains Malays, Penang, 11800, Malaysia |
| authorships[2].institutions[0].id | https://openalex.org/I139322472 |
| authorships[2].institutions[0].ror | https://ror.org/02rgb2k63 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I139322472 |
| authorships[2].institutions[0].country_code | MY |
| authorships[2].institutions[0].display_name | Universiti Sains Malaysia |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Rosni Abdullah |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Computer Sciences, Universiti Sains Malays, Penang, 11800, Malaysia |
| authorships[3].author.id | https://openalex.org/A5062826520 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-4228-9298 |
| authorships[3].author.display_name | Zaid Abdi Alkareem Alyasseri |
| authorships[3].countries | IQ |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210142005, https://openalex.org/I4392021143 |
| authorships[3].affiliations[0].raw_affiliation_string | College of Engineering, University of Warith Al-Anbiyaa, Karbala, Iraq |
| authorships[3].affiliations[1].institution_ids | https://openalex.org/I47229656 |
| authorships[3].affiliations[1].raw_affiliation_string | Information Technology Research and Development Center, University of Kufa, Najaf, Iraq |
| authorships[3].institutions[0].id | https://openalex.org/I4392021143 |
| authorships[3].institutions[0].ror | https://ror.org/03ase0085 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4392021143 |
| authorships[3].institutions[0].country_code | |
| authorships[3].institutions[0].display_name | University of Warith Al-Anbiyaa |
| authorships[3].institutions[1].id | https://openalex.org/I4210142005 |
| authorships[3].institutions[1].ror | https://ror.org/0449bkp65 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I4210142005 |
| authorships[3].institutions[1].country_code | IQ |
| authorships[3].institutions[1].display_name | University of Kerbala |
| authorships[3].institutions[2].id | https://openalex.org/I47229656 |
| authorships[3].institutions[2].ror | https://ror.org/02dwrdh81 |
| authorships[3].institutions[2].type | education |
| authorships[3].institutions[2].lineage | https://openalex.org/I47229656 |
| authorships[3].institutions[2].country_code | IQ |
| authorships[3].institutions[2].display_name | University of Kufa |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Zaid Abdi Alkareem Alyasseri |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Engineering, University of Warith Al-Anbiyaa, Karbala, Iraq, Information Technology Research and Development Center, University of Kufa, Najaf, Iraq |
| authorships[4].author.id | https://openalex.org/A5043993280 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Hussam Mohammed Jasim |
| authorships[4].countries | IQ |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I3131779051, https://openalex.org/I4401041618 |
| authorships[4].affiliations[0].raw_affiliation_string | Business Administration, College of Administration and Financial Sciences, Imam Ja'afar Al-Sadiq University, Baghdad 10001, Iraq |
| authorships[4].institutions[0].id | https://openalex.org/I4401041618 |
| authorships[4].institutions[0].ror | https://ror.org/02477a553 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4401041618 |
| authorships[4].institutions[0].country_code | |
| authorships[4].institutions[0].display_name | Imam Ja’afar Al-Sadiq University |
| authorships[4].institutions[1].id | https://openalex.org/I3131779051 |
| authorships[4].institutions[1].ror | https://ror.org/01wfhkb67 |
| authorships[4].institutions[1].type | education |
| authorships[4].institutions[1].lineage | https://openalex.org/I3131779051 |
| authorships[4].institutions[1].country_code | IQ |
| authorships[4].institutions[1].display_name | Iraqi University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Hussam Mohammed Jasim |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Business Administration, College of Administration and Financial Sciences, Imam Ja'afar Al-Sadiq University, Baghdad 10001, Iraq |
| authorships[5].author.id | https://openalex.org/A5080382393 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-5802-5946 |
| authorships[5].author.display_name | Nor Samsiah Sani |
| authorships[5].countries | MY |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I885383172 |
| authorships[5].affiliations[0].raw_affiliation_string | CAIT, Faculty of Information Science &Technology, Universiti Kebangsaan Malaysia, Bangi 43600, Selangor, Malaysia |
| authorships[5].institutions[0].id | https://openalex.org/I885383172 |
| authorships[5].institutions[0].ror | https://ror.org/00bw8d226 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I885383172 |
| authorships[5].institutions[0].country_code | MY |
| authorships[5].institutions[0].display_name | National University of Malaysia |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Nor Samsiah Sani |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | CAIT, Faculty of Information Science &Technology, Universiti Kebangsaan Malaysia, Bangi 43600, Selangor, Malaysia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.procs.2023.03.103 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2783466926, https://openalex.org/W4286539397, https://openalex.org/W1968168724, https://openalex.org/W2204131204, https://openalex.org/W2754163055, https://openalex.org/W4256682929, https://openalex.org/W4322008378, https://openalex.org/W2383770723, https://openalex.org/W2186749541, https://openalex.org/W2360429410 |
| cited_by_count | 7 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 4 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.procs.2023.03.103 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120348307 |
| best_oa_location.source.issn | 1877-0509 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1877-0509 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Procedia Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Procedia Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.procs.2023.03.103 |
| primary_location.id | doi:10.1016/j.procs.2023.03.103 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120348307 |
| primary_location.source.issn | 1877-0509 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1877-0509 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Procedia Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Procedia Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1016/j.procs.2023.03.103 |
| publication_date | 2023-01-01 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W6672559965, https://openalex.org/W1847242080, https://openalex.org/W6744881047, https://openalex.org/W6748085533, https://openalex.org/W2034698017, https://openalex.org/W2135163041, https://openalex.org/W2159698298, https://openalex.org/W6734341391, https://openalex.org/W2616970092, https://openalex.org/W6671564837, https://openalex.org/W6653847965, https://openalex.org/W6638288848, https://openalex.org/W6760566728, https://openalex.org/W6785210910, https://openalex.org/W4224046934, https://openalex.org/W6767667032, https://openalex.org/W6695088010, https://openalex.org/W2605326373, https://openalex.org/W6719555326, https://openalex.org/W2829538282, https://openalex.org/W2467869887, https://openalex.org/W4302320922, https://openalex.org/W2088729967, https://openalex.org/W2921901916, https://openalex.org/W2595334575, https://openalex.org/W4297825776, https://openalex.org/W3100933494, https://openalex.org/W2547518362 |
| referenced_works_count | 28 |
| abstract_inverted_index.5 | 227 |
| abstract_inverted_index.6 | 3 |
| abstract_inverted_index.A | 118 |
| abstract_inverted_index.a | 26, 86, 93, 102, 140, 148, 190 |
| abstract_inverted_index.10 | 212 |
| abstract_inverted_index.IP | 10, 17 |
| abstract_inverted_index.an | 80, 181 |
| abstract_inverted_index.as | 31, 49 |
| abstract_inverted_index.by | 130 |
| abstract_inverted_index.in | 21 |
| abstract_inverted_index.is | 5, 43, 61, 85, 163 |
| abstract_inverted_index.of | 9, 19, 28, 51, 57, 63, 89, 92, 105, 108, 135, 157 |
| abstract_inverted_index.on | 189 |
| abstract_inverted_index.to | 13, 45, 123, 164, 174, 209 |
| abstract_inverted_index.FPA | 192, 220 |
| abstract_inverted_index.The | 154, 195 |
| abstract_inverted_index.and | 36, 54, 76, 99, 110, 128, 214 |
| abstract_inverted_index.for | 142 |
| abstract_inverted_index.has | 193 |
| abstract_inverted_index.one | 62 |
| abstract_inverted_index.out | 69 |
| abstract_inverted_index.the | 6, 22, 32, 64, 90, 115, 125, 132, 158, 166, 171, 175, 199, 205, 215, 222 |
| abstract_inverted_index.DDoS | 60, 145, 178, 184 |
| abstract_inverted_index.IPv6 | 24, 42 |
| abstract_inverted_index.MFPA | 162 |
| abstract_inverted_index.This | 137 |
| abstract_inverted_index.best | 206, 223 |
| abstract_inverted_index.data | 106 |
| abstract_inverted_index.from | 170 |
| abstract_inverted_index.goal | 12 |
| abstract_inverted_index.host | 14 |
| abstract_inverted_index.main | 155 |
| abstract_inverted_index.most | 65, 167 |
| abstract_inverted_index.show | 197 |
| abstract_inverted_index.such | 30, 48 |
| abstract_inverted_index.that | 11, 73, 95, 198 |
| abstract_inverted_index.time | 127 |
| abstract_inverted_index.with | 101, 211, 226 |
| abstract_inverted_index.(DoS) | 53 |
| abstract_inverted_index.(IDS) | 84 |
| abstract_inverted_index.based | 188 |
| abstract_inverted_index.deals | 100 |
| abstract_inverted_index.equal | 208 |
| abstract_inverted_index.first | 161, 200 |
| abstract_inverted_index.helps | 122 |
| abstract_inverted_index.model | 187 |
| abstract_inverted_index.paper | 138 |
| abstract_inverted_index.rate. | 117 |
| abstract_inverted_index.using | 147 |
| abstract_inverted_index.which | 113 |
| abstract_inverted_index.(IPv6) | 4 |
| abstract_inverted_index.(MFPA) | 203 |
| abstract_inverted_index.97.01% | 225 |
| abstract_inverted_index.97.96% | 210 |
| abstract_inverted_index.Denial | 50, 56 |
| abstract_inverted_index.Flower | 150 |
| abstract_inverted_index.ICMPv6 | 71, 144, 172, 177 |
| abstract_inverted_index.System | 83 |
| abstract_inverted_index.affect | 114 |
| abstract_inverted_index.amount | 104 |
| abstract_inverted_index.detect | 176 |
| abstract_inverted_index.impose | 74 |
| abstract_inverted_index.latest | 7 |
| abstract_inverted_index.method | 141, 202, 218 |
| abstract_inverted_index.needed | 25 |
| abstract_inverted_index.number | 27 |
| abstract_inverted_index.reduce | 124 |
| abstract_inverted_index.scheme | 35 |
| abstract_inverted_index.second | 216 |
| abstract_inverted_index.select | 165 |
| abstract_inverted_index.subset | 134 |
| abstract_inverted_index.system | 88 |
| abstract_inverted_index.unique | 16 |
| abstract_inverted_index.(DDoS), | 59 |
| abstract_inverted_index.(MFPA). | 153 |
| abstract_inverted_index.Address | 33 |
| abstract_inverted_index.Control | 38 |
| abstract_inverted_index.Message | 39 |
| abstract_inverted_index.Second, | 180 |
| abstract_inverted_index.Service | 52, 58 |
| abstract_inverted_index.attacks | 47, 67, 146, 186 |
| abstract_inverted_index.carried | 68 |
| abstract_inverted_index.dataset | 173 |
| abstract_inverted_index.detects | 96 |
| abstract_inverted_index.devices | 20 |
| abstract_inverted_index.feature | 119 |
| abstract_inverted_index.massive | 103 |
| abstract_inverted_index.method, | 160 |
| abstract_inverted_index.network | 94 |
| abstract_inverted_index.optimum | 133 |
| abstract_inverted_index.purpose | 156 |
| abstract_inverted_index.results | 196 |
| abstract_inverted_index.through | 70 |
| abstract_inverted_index.version | 2, 8 |
| abstract_inverted_index.3.4*1038 | 15 |
| abstract_inverted_index.Internet | 0, 37 |
| abstract_inverted_index.Protocol | 1, 40 |
| abstract_inverted_index.accuracy | 207, 224 |
| abstract_inverted_index.achieved | 204, 221 |
| abstract_inverted_index.attacks. | 179 |
| abstract_inverted_index.enhanced | 182 |
| abstract_inverted_index.features | 112, 169, 213 |
| abstract_inverted_index.flooding | 185 |
| abstract_inverted_index.messages | 72 |
| abstract_inverted_index.modified | 149 |
| abstract_inverted_index.network. | 23 |
| abstract_inverted_index.numerous | 46 |
| abstract_inverted_index.proposed | 159, 201, 217 |
| abstract_inverted_index.proposes | 139 |
| abstract_inverted_index.relevant | 168 |
| abstract_inverted_index.security | 75, 91 |
| abstract_inverted_index.(ICMPv6), | 41 |
| abstract_inverted_index.Algorithm | 152 |
| abstract_inverted_index.Detection | 82 |
| abstract_inverted_index.Intrusion | 81 |
| abstract_inverted_index.addresses | 18 |
| abstract_inverted_index.comprised | 107 |
| abstract_inverted_index.dangerous | 66 |
| abstract_inverted_index.detecting | 143, 183 |
| abstract_inverted_index.detection | 116 |
| abstract_inverted_index.features. | 136, 228 |
| abstract_inverted_index.pecuniary | 77 |
| abstract_inverted_index.proposed. | 194 |
| abstract_inverted_index.protocols | 29 |
| abstract_inverted_index.selecting | 131 |
| abstract_inverted_index.selection | 120 |
| abstract_inverted_index.technique | 121 |
| abstract_inverted_index.Therefore, | 79 |
| abstract_inverted_index.activities | 98 |
| abstract_inverted_index.complexity | 129 |
| abstract_inverted_index.monitoring | 87 |
| abstract_inverted_index.repetitive | 109 |
| abstract_inverted_index.suspicious | 97 |
| abstract_inverted_index.vulnerable | 44 |
| abstract_inverted_index.Distributed | 55 |
| abstract_inverted_index.Pollination | 151 |
| abstract_inverted_index.computation | 126 |
| abstract_inverted_index.implications. | 78 |
| abstract_inverted_index.inappropriate | 111 |
| abstract_inverted_index.Multi-Objective | 219 |
| abstract_inverted_index.multi-objective | 191 |
| abstract_inverted_index.Auto-configuration | 34 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 96 |
| corresponding_author_ids | https://openalex.org/A5042044177 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I139322472 |
| citation_normalized_percentile.value | 0.83981526 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |