{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:12:58Z","timestamp":1763536378737,"version":"3.44.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Natural Science Basis Research Plan in Shaanxi Province of China","doi-asserted-by":"publisher","award":["2025JC-JCQN-089"],"award-info":[{"award-number":["2025JC-JCQN-089"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302358"],"award-info":[{"award-number":["62302358"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Doctoral Startup Fund of China (Project Title: Discovery of Advanced Persistent Threat","award":["205200100654"],"award-info":[{"award-number":["205200100654"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62362038"],"award-info":[{"award-number":["62362038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3606644","type":"journal-article","created":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:24:29Z","timestamp":1757096669000},"page":"157587-157599","source":"Crossref","is-referenced-by-count":1,"title":["EfficientSTNet: A Deep Learning Approach for Multi-Class DDoS Detection"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0687-0086","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"first","affiliation":[{"name":"Hangzhou Institute of Technology, Xidian University, Hangzhou, China"}]},{"given":"Yujuan","family":"Bai","sequence":"additional","affiliation":[{"name":"Hangzhou Institute of Technology, Xidian University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2279-1988","authenticated-orcid":false,"given":"Tao","family":"Xue","sequence":"additional","affiliation":[{"name":"Hangzhou Institute of Technology, Xidian University, Hangzhou, China"}]},{"given":"Guanhua","family":"Feng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Mechanics, Beijing, China"}]},{"given":"Haibin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Hangzhou, China"}]}],"member":"263","reference":[{"volume-title":"Recent Cyber Attacks 2023: 5 Major Data Breaches & Ransomware Attacks","year":"2025","author":"Alliance","key":"ref1"},{"volume-title":"\u2019Sky Aid\u2019 Cyber Campaign: A Looming Threat Following the Credit Guard DDoS Attack","year":"2025","key":"ref2"},{"volume-title":"DDoS Threat Report (2025 Edition)","year":"2025","key":"ref3"},{"volume-title":"DDoS Attack Count 2023\u20132024","year":"2025","key":"ref4"},{"volume-title":"Microsoft Digital Defense Report 2024","year":"2025","author":"Security","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17586\/2226-1494-2025-25-1-114-127"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v10.i2.pp382-388"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.97"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.07.019"},{"issue":"12","key":"ref11","first-page":"3367","article-title":"DDoS attack traceback model based on IP entropy variables","volume":"40","author":"Guo","year":"2019","journal-title":"Comput. Eng. Design"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104199"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100812"},{"issue":"6","key":"ref14","first-page":"1032","article-title":"DDoS attack detection scheme based on software-defined networking","volume":"34","author":"Xie","year":"2022","journal-title":"J. Chongqing Univ. Posts Telecommun."},{"issue":"S1","key":"ref15","first-page":"555","article-title":"DDoS attack detection method in SDN environment based on Renyi entropy and BiGRU algorithm","volume":"49","author":"Yang","year":"2022","journal-title":"Comput. Sci."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963077"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i4.157166"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/sym14061095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PIC50277.2020.9350788"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECE51049.2023.10085248"},{"issue":"11","key":"ref22","first-page":"389","article-title":"DDoS attack detection model in SDN based on statistics and ensemble autoencoder","volume":"51","author":"Li","year":"2024","journal-title":"Comput. Sci."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.037"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0623-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123791"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108076"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101938"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3384528"},{"article-title":"Research on DDoS attack detection method based on deep learning","year":"2024","author":"Xu","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484569"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2024.102777"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00535-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022855"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73280-6_31"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/app12167986"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3334916"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3405837.3411384"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i11.29123"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3196942"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.049"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8208-z"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-323-96104-2.00002-6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ITME63426.2024.00080"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11152000.pdf?arnumber=11152000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:38:52Z","timestamp":1757957932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11152000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3606644","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}