{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:21:13Z","timestamp":1766067673095},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041318","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"554-562","source":"Crossref","is-referenced-by-count":2,"title":["SENTINEL: Self Protecting 5G Core Control Plane from DDoS Attacks for High Availability Service"],"prefix":"10.1109","author":[{"given":"Aditya","family":"Chilukuri","sequence":"first","affiliation":[{"name":"Indian Institute of Technology,Department of Computer Science and Engineering,Hyderabad"}]},{"given":"Shwetha","family":"Vittal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Department of Computer Science and Engineering,Hyderabad"}]},{"given":"A Antony","family":"Franklin","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Department of Computer Science and Engineering,Hyderabad"}]}],"member":"263","reference":[{"volume-title":"System Architecture for the 5G System","year":"2021","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615531"},{"volume-title":"Core network and transmission dimensioning","year":"2016","author":"Tabbane","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3035342"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF52925.2021.00061"},{"key":"ref6","first-page":"1","article-title":"Unsupervised real-time anomaly detection for streaming data","author":"Purdy","year":"2017","journal-title":"Neurocomputing"},{"key":"ref7","article-title":"Biological and machine intelligence (bami)","author":"Hawkins","year":"2016","journal-title":"Initial online release 0.4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281443"},{"article-title":"eBPF","volume-title":"eBPF Working Group","year":"2021","key":"ref9"},{"volume-title":"DDoS mitigation made easy with XDP and eBPF","year":"2019","key":"ref10"},{"volume-title":"Katran, a scalable network load balancer","year":"2018","key":"ref11"},{"volume-title":"What is DDoS mitigation?","key":"ref12"},{"volume-title":"DDoS Attacks: Technique Overview and Mitigation Best Practices","key":"ref13"},{"volume-title":"Procedures for the 5G System","year":"2018","key":"ref14"},{"volume-title":"Security architecture and procedures for 5G system","year":"2018","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/862527"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615546"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.125"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/APWiMob.2014.6920286"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s22103819"},{"volume-title":"An overview of concept drift applications","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"volume-title":"Skyline","key":"ref23"},{"volume-title":"Introducing practical and robust anomaly detection in a time series","key":"ref24"},{"volume-title":"NuPIC - Numenta Platform for Intelligent Computing","key":"ref25"},{"volume-title":"free5GC","year":"2020","key":"ref26"},{"volume-title":"OpenAirInterface 5G core network development","key":"ref27"},{"volume-title":"Open source project of 5GC and EPC","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3157888"},{"volume-title":"ROC Curves and Precision-Recall Curves for Imbalanced Classification","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s20133745"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647590"},{"volume-title":"Network Functions Virtualisation (NFV) Release 3;Reliability;Report on NFV Resiliency for the Support of Network Slicing","year":"2019","key":"ref33"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2023,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041318.pdf?arnumber=10041318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:39:07Z","timestamp":1707835147000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041318","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}