{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:54:21Z","timestamp":1774929261949,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T00:00:00Z","timestamp":1722643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"This work is supported by National Key R&D Program of China","award":["(No. 2023YFF0717602)"],"award-info":[{"award-number":["(No. 2023YFF0717602)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,3]]},"DOI":"10.1145\/3663408.3663424","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T12:23:29Z","timestamp":1719923009000},"page":"108-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["ShieldGPT: An LLM-based Framework for DDoS Mitigation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0052-8402","authenticated-orcid":false,"given":"Tongze","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9413-4461","authenticated-orcid":false,"given":"Xiaohui","family":"Xie","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7991-2915","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8296-3785","authenticated-orcid":false,"given":"Chuyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2035-6157","authenticated-orcid":false,"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5171-739X","authenticated-orcid":false,"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107871"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114520"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"e_1_3_2_1_4_1","volume-title":"Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT\/IIoT Devices","author":"Ferrag Mohamed\u00a0Amine","year":"2024","unstructured":"Mohamed\u00a0Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas\u00a0C Cordeiro, Merouane Debbah, Thierry Lestable, and Narinderjit\u00a0Singh Thandi. 2024. Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT\/IIoT Devices. IEEE Access (2024)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628176"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1141-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"e_1_3_2_1_8_1","volume-title":"Chatids: Explainable cybersecurity using generative ai. arXiv preprint arXiv:2306.14504","author":"J\u00fcttner Victor","year":"2023","unstructured":"Victor J\u00fcttner, Martin Grimmer, and Erik Buchmann. 2023. Chatids: Explainable cybersecurity using generative ai. arXiv preprint arXiv:2306.14504 (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107390"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628191"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628183"},{"key":"e_1_3_2_1_13_1","volume-title":"Netgpt: Generative pretrained transformer for network traffic. arXiv preprint arXiv:2304.09513","author":"Meng Xuying","year":"2023","unstructured":"Xuying Meng, Chungang Lin, Yequan Wang, and Yujun Zhang. 2023. Netgpt: Generative pretrained transformer for network traffic. arXiv preprint arXiv:2304.09513 (2023)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628194"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8469-5_5"},{"key":"e_1_3_2_1_16_1","volume-title":"Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In 2019 international carnahan conference on security technology (ICCST)","author":"Sharafaldin Iman","unstructured":"Iman Sharafaldin, Arash\u00a0Habibi Lashkari, Saqib Hakak, and Ali\u00a0A Ghorbani. 2019. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In 2019 international carnahan conference on security technology (ICCST). IEEE, 1\u20138."},{"key":"e_1_3_2_1_17_1","volume-title":"Lens: A Foundation Model for Network Traffic in Cybersecurity. arXiv e-prints","author":"Wang Qineng","year":"2024","unstructured":"Qineng Wang, Chen Qian, Xiaochang Li, Ziyu Yao, and Huajie Shao. 2024. Lens: A Foundation Model for Network Traffic in Cybersecurity. arXiv e-prints (2024), arXiv\u20132402."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25674"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628212"},{"key":"e_1_3_2_1_20_1","volume-title":"Explaining tree model decisions in natural language for network intrusion detection. arXiv preprint arXiv:2310.19658","author":"Ziems Noah","year":"2023","unstructured":"Noah Ziems, Gang Liu, John Flanagan, and Meng Jiang. 2023. Explaining tree model decisions in natural language for network intrusion detection. arXiv preprint arXiv:2310.19658 (2023)."}],"event":{"name":"APNet 2024: The 8th Asia-Pacific Workshop on Networking","location":"Sydney Australia","acronym":"APNet 2024"},"container-title":["Proceedings of the 8th Asia-Pacific Workshop on Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663408.3663424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663408.3663424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:32:41Z","timestamp":1755905561000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663408.3663424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,3]]},"references-count":20,"alternative-id":["10.1145\/3663408.3663424","10.1145\/3663408"],"URL":"https:\/\/doi.org\/10.1145\/3663408.3663424","relation":{},"subject":[],"published":{"date-parts":[[2024,8,3]]},"assertion":[{"value":"2024-08-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}