{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:07:19Z","timestamp":1753355239923,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research on network identity trusted communication technology architecture","award":["KWL21095530"],"award-info":[{"award-number":["KWL21095530"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506508","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"77-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoT"],"prefix":"10.1145","author":[{"given":"Huifen","family":"Feng","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Technologies, Beijing Jiaotong University, Beijing, China"}]},{"given":"Xincheng","family":"Yan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mobile Network and Mobile Multimedia Technology, ZTE Corporation, Shenzhen, China and Nanjing, China"}]},{"given":"Na","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mobile Network and Mobile Multimedia Technology, ZTE Corporation, Shenzhen, China and Nanjing, China"}]},{"given":"Zhihong","family":"Jiang","sequence":"additional","affiliation":[{"name":"ZTE Corporation and Nanjing, China"}]},{"given":"Ying","family":"Liu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Technologies, Beijing Jiaotong University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"e_1_3_2_1_2_1","unstructured":"Top Strategic Predictions for 2017 and Beyond: Surviving the Storm Winds of Digital Disruption [online] Available: https:\/\/www.gartner.com\/doc\/3471568?ref=unauthreader.  Top Strategic Predictions for 2017 and Beyond: Surviving the Storm Winds of Digital Disruption [online] Available: https:\/\/www.gartner.com\/doc\/3471568?ref=unauthreader."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2017.1700041"},{"key":"e_1_3_2_1_4_1","first-page":"64","volume-title":"Bengaluru","author":"Desai B. A.","year":"2019","unstructured":"B. A. Desai , D. M. Divakaran , I. Nevat , G. W. Peter and M. Gurusamy , \" A feature-ranking framework for IoT device classification,\" 2019 11th International Conference on Communication Systems & Networks (COMSNETS) , Bengaluru , India , 2019 , pp. 64 -- 71 , doi:10.1109\/COMSNETS.2019.8711210. 10.1109\/COMSNETS.2019.8711210 B. A. Desai, D. M. Divakaran, I. Nevat, G. W. Peter and M. Gurusamy, \"A feature-ranking framework for IoT device classification,\" 2019 11th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 2019, pp. 64--71, doi:10.1109\/COMSNETS.2019.8711210."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2828938"},{"issue":"58","key":"e_1_3_2_1_7_1","first-page":"13","article-title":"DDoS Attack in Software Defined Networks: A Survey","volume":"15","author":"Xiaoqiong XU","year":"2017","unstructured":"XU Xiaoqiong , YU Hongfang , YANG Kun , \" DDoS Attack in Software Defined Networks: A Survey ,\" ZTE Communications , vol. 15 , no. 58 (03), pp. 13 -- 19 , Sept. 2017 . XU Xiaoqiong, YU Hongfang, YANG Kun, \"DDoS Attack in Software Defined Networks: A Survey,\" ZTE Communications, vol. 15, no. 58(03), pp. 13--19, Sept. 2017.","journal-title":"ZTE Communications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900318"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882855"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043740"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Coimbatore","author":"Sridhar S.","year":"2017","unstructured":"S. Sridhar and S. Smys , \" Intelligent security framework for iot devices cryptography based end-to-end security architecture,\" 2017 International Conference on Inventive Systems and Control (ICISC) , Coimbatore , India , 2017 , pp. 1 -- 5 , doi: 10.1109\/ICISC.2017.8068718. 10.1109\/ICISC.2017.8068718 S. Sridhar and S. Smys, \"Intelligent security framework for iot devices cryptography based end-to-end security architecture,\" 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2017, pp. 1--5, doi: 10.1109\/ICISC.2017.8068718."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930715"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwy133"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Rennes","author":"Abuhashim A.","year":"2020","unstructured":"A. Abuhashim and C. C. Tan , \" Smart Contract Designs on Blockchain Applications,\" 2020 IEEE Symposium on Computers and Communications (ISCC) , Rennes , France , 2020 , pp. 1 -- 4 , doi: 10.1109\/ISCC50000.2020.9219622. 10.1109\/ISCC50000.2020.9219622 A. Abuhashim and C. C. Tan, \"Smart Contract Designs on Blockchain Applications,\" 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, 2020, pp. 1--4, doi: 10.1109\/ISCC50000.2020.9219622."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900151"},{"issue":"72","key":"e_1_3_2_1_17_1","first-page":"18","article-title":"DDoS Attack Detection Method for Space-Based Network Based on SDN Architecture","volume":"18","author":"Min JIA","year":"2020","unstructured":"JIA Min , SHU Yuejie , GUO Qing , GAO Zihe , XIE Suofei , \" DDoS Attack Detection Method for Space-Based Network Based on SDN Architecture ,\" in ZTE Communications , vol. 18 , no. 72 (04), pp. 18 -- 25 , Sept. 2020 . JIA Min, SHU Yuejie, GUO Qing, GAO Zihe, XIE Suofei, \"DDoS Attack Detection Method for Space-Based Network Based on SDN Architecture,\" in ZTE Communications, vol. 18, no. 72(04), pp. 18--25, Sept. 2020.","journal-title":"ZTE Communications"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2973176"},{"volume-title":"Interorganization cooperative DDOS protection mechanism\". Accessed","year":"2019","key":"e_1_3_2_1_19_1","unstructured":"K.Nishizuka, L.Xia, J.Xia, D.Zhang, L.Fang, C.Gray : \" Interorganization cooperative DDOS protection mechanism\". Accessed : May . 1, 2019 . [Online]. Available : Draft . https:\/\/tools.ietf.org\/html\/draft-nishizuka-dots-inter-domain-mechanism-02. K.Nishizuka, L.Xia, J.Xia, D.Zhang, L.Fang, C.Gray: \"Interorganization cooperative DDOS protection mechanism\". Accessed: May. 1, 2019. [Online]. Available: Draft. https:\/\/tools.ietf.org\/html\/draft-nishizuka-dots-inter-domain-mechanism-02."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2828938"},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE\/IFIP Network Operations and Management Symposium","author":"Giotis K.","year":"2016","unstructured":"K. Giotis , M. Apostolaki , and V. Maglaris . A reputation-basedcollaborative schema for the mitigation of distributed attacks in sdn domains . In IEEE\/IFIP Network Operations and Management Symposium , 2016 . K. Giotis, M. Apostolaki, and V. Maglaris. A reputation-basedcollaborative schema for the mitigation of distributed attacks in sdn domains. In IEEE\/IFIP Network Operations and Management Symposium, 2016."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2924442"},{"issue":"10","key":"e_1_3_2_1_23_1","first-page":"622","article-title":"DDoS Mitigation Using Blockchain","volume":"1","author":"Dheeraj J.","year":"2018","unstructured":"J. Dheeraj , S. Gurubharan , \" DDoS Mitigation Using Blockchain \", International Journal of Research in Engineering Science and Management , vol. 1 , no. 10 , pp. 622 -- 626 , October 2018 . J. Dheeraj, S. Gurubharan, \"DDoS Mitigation Using Blockchain\", International Journal of Research in Engineering Science and Management, vol. 1, no. 10, pp. 622--626, October 2018.","journal-title":"International Journal of Research in Engineering Science and Management"},{"key":"e_1_3_2_1_24_1","unstructured":"\"Geth\" [Online]. Available: https:\/\/geth.ethereum.org\/downloads\/.  \"Geth\" [Online]. Available: https:\/\/geth.ethereum.org\/downloads\/."},{"key":"e_1_3_2_1_25_1","unstructured":"\"Remix\" [Online]. Available: http:\/\/remix.ethereum.org\/.  \"Remix\" [Online]. Available: http:\/\/remix.ethereum.org\/."}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":25,"alternative-id":["10.1145\/3491396.3506508","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506508","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}