{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:51:21Z","timestamp":1775620281576,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"17","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91938302"],"award-info":[{"award-number":["91938302"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62025110"],"award-info":[{"award-number":["62025110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871257"],"award-info":[{"award-number":["61871257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFA0701601"],"award-info":[{"award-number":["2018YFA0701601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2019A1515011052"],"award-info":[{"award-number":["2019A1515011052"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/jiot.2022.3176121","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T19:36:09Z","timestamp":1652902569000},"page":"15497-15510","source":"Crossref","is-referenced-by-count":38,"title":["A Distributed Collaborative Entrance Defense Framework Against DDoS Attacks on Satellite Internet"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3522-8924","authenticated-orcid":false,"given":"Wei","family":"Guo","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing, China"}]},{"given":"Jin","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9291-084X","authenticated-orcid":false,"given":"Yukui","family":"Pei","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Research Institute of Tsinghua, Pearl River Delta, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4441-9490","authenticated-orcid":false,"given":"Liuguo","family":"Yin","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3703-121X","authenticated-orcid":false,"given":"Chunxiao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4922-7025","authenticated-orcid":false,"given":"Ning","family":"Ge","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4922-3_14"},{"issue":"6","key":"ref2","first-page":"887","article-title":"A survey paper on security issues in satellite communication network infrastructure","volume":"2","author":"Shah","year":"2014","journal-title":"Int. J. Eng. Res. Gen. Sci."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804176"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3093538"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041641"},{"issue":"4","key":"ref6","first-page":"18","article-title":"DDoS attack detection method for space-based network based on SDN architecture","volume":"18","author":"Min","year":"2021","journal-title":"ZTE Commun."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7340429"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320725"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2983711"},{"key":"ref10","volume-title":"DDoS attacks in Q2 2021","author":"Gutnikov","year":"2021"},{"key":"ref11","volume-title":"Cisco annual Internet report (2018\u20132023) white paper","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03323-w"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym13020227"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97643-3_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473586"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-9491-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.97"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2439287"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60774-0_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref21","volume-title":"Beyond on-demand for DDoS defense","year":"2021"},{"key":"ref22","volume-title":"DDoS protection","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.191"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.262"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2827"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2003.1201153"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21236\/ADA401819"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.02.025"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916716"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383061"},{"key":"ref33","first-page":"1","article-title":"DiCoDefense: Distributed collaborative defense against DDoS flooding attacks","volume-title":"Proc. IEEE Symp. Security Privacy","author":"Zargar"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918069"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.09.001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/Ubi-Media.2019.00010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930715"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148808"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647279"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014870"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013542"},{"key":"ref42","first-page":"1","article-title":"Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS)","volume-title":"Proc. 42nd IEEE Conf. Local Comput. Netw.","author":"Rodrigues"},{"key":"ref43","first-page":"533","article-title":"Evaluating a blockchain-based cooperative defense","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manag. (IM)","author":"Rodrigues"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3342280.3342300"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169750"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2079327.2079334"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502848"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0081-z"},{"issue":"4","key":"ref50","first-page":"444","article-title":"Survey on intrusion detection system types","volume":"7","author":"Othman","year":"2018","journal-title":"Int. J. Cyber Security Digit. Forensics"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.2478\/jaiscr-2021-0008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99843-5_10"},{"issue":"8","key":"ref53","first-page":"25","article-title":"A survey of transport protocols for deep space communication networks","volume":"31","author":"Sarkar","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996590"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100371"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943146"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9866069\/09777763.pdf?arnumber=9777763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:04:36Z","timestamp":1705964676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9777763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":56,"journal-issue":{"issue":"17"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3176121","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}