{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:53:55Z","timestamp":1776354835712,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,27]]},"DOI":"10.1145\/3803525.3804985","type":"proceedings-article","created":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:54:47Z","timestamp":1776351287000},"page":"98-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DTAC: Decision-Tree-based Automatic Configuration of Entangled DDoS Defense Policies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8883-9865","authenticated-orcid":false,"given":"Yunpeng","family":"Tan","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0552-865X","authenticated-orcid":false,"given":"Qingyang","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0700-8299","authenticated-orcid":false,"given":"Mingxin","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0484-5951","authenticated-orcid":false,"given":"Xinggong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229100"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103736"},{"key":"e_1_3_2_1_4_1","unstructured":"MAWI Working Group. 2025. MAWI Working Group Traffic Archive. https:\/\/mawi.wide.ad.jp\/mawi\/ 2025-05-31."},{"key":"e_1_3_2_1_5_1","unstructured":"L. F. Haaijer. 2022. DDoS Packet Capture Collection. https:\/\/github.com\/StopDDoS\/packet-captures. Available from: https:\/\/github.com\/StopDDoS\/packet-captures."},{"key":"e_1_3_2_1_6_1","volume-title":"LLM-based Multi-class Attack Analysis and Mitigation Framework in IoT\/IIoT Networks. In 2025 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT). IEEE, 1\u20138.","author":"Ikbarieh Seif","year":"2025","unstructured":"Seif Ikbarieh, Maanak Gupta, and Elmahedi Mahalal. 2025. LLM-based Multi-class Attack Analysis and Mitigation Framework in IoT\/IIoT Networks. In 2025 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT). IEEE, 1\u20138."},{"key":"e_1_3_2_1_7_1","volume-title":"Chatids: Explainable cybersecurity using generative ai. arXiv preprint arXiv:2306.14504","author":"J\u00fcttner Victor","year":"2023","unstructured":"Victor J\u00fcttner, Martin Grimmer, and Erik Buchmann. 2023. Chatids: Explainable cybersecurity using generative ai. arXiv preprint arXiv:2306.14504 (2023)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.21227\/q70p-q449"},{"key":"e_1_3_2_1_9_1","volume-title":"GRIDAI: Generating and Repairing Intrusion Detection Rules via Collaboration among Multiple LLM-based Agents. arXiv preprint arXiv:2510.13257","author":"Li Jiarui","year":"2025","unstructured":"Jiarui Li, Yuhan Chai, Lei Du, Chenyun Duan, Hao Yan, and Zhaoquan Gu. 2025. GRIDAI: Generating and Repairing Intrusion Detection Rules via Collaboration among Multiple LLM-based Agents. arXiv preprint arXiv:2510.13257 (2025)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621157"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the ACM Web Conference","author":"Lin Xinjie","year":"2022","unstructured":"Xinjie Lin, Gang Xiong, Gaopeng Gou, Zhen Li, Junzheng Shi, and Jing Yu. 2022. Et-bert:Acontextualizeddatagramrepresentationwithpre-trainingtransformers for encrypted traffic classification. In Proceedings of the ACM Web Conference 2022. 633\u2013642."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 19th International Conference on Availability, Reliability and Security. 1\u20137.","author":"Louro Bernardo","unstructured":"Bernardo Louro, Raquel Abreu, Joana Cabral Costa, Jo\u00e3o B F. Sequeiros, and Pedro R M. In\u00e1cio. 2024. Analysis of the capability and training of chat bots in the generation of rules for firewall or intrusion detection systems. In Proceedings of the 19th International Conference on Availability, Reliability and Security. 1\u20137."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539085"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"e_1_3_2_1_15_1","unstructured":"NETSCOUT. 2026. Arbor Threat Mitigation System for DDoS Attacks. https:\/\/www.netscout.com\/product\/arbor-threat-mitigation-system 2026-02-04."},{"key":"e_1_3_2_1_16_1","unstructured":"NSFOCUS. 2019. NSFOCUS ADS. https:\/\/www.nsfocus.com.cn\/html\/2019\/206_1009\/69.html 2026-02-04."},{"key":"e_1_3_2_1_17_1","unstructured":"OpenAI. 2026. GPT-5.2 in ChatGPT. https:\/\/help.openai.com\/en\/articles\/11909943-gpt-52-in-chatgpt?utm_source=chatgpt.com 2026-02-02."},{"key":"e_1_3_2_1_18_1","volume-title":"Ptu: Pre-Trained Model for Network Traffic Understanding. In 2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 1\u201312","author":"Peng Lingfeng","year":"2024","unstructured":"Lingfeng Peng, Xiaohui Xie, Sijiang Huang, Ziyi Wang, and Yong Cui. 2024. Ptu: Pre-Trained Model for Network Traffic Understanding. In 2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 1\u201312."},{"key":"e_1_3_2_1_19_1","unstructured":"Radware. 2025. AI DDoS: How Artificial Intelligence Is Changing the Face of Cyber Attacks. https:\/\/www.sangfor.com\/blog\/cybersecurity\/ai-ddos-attacks 2026-02-05."},{"key":"e_1_3_2_1_20_1","unstructured":"Radware. 2026. Radware DefensePro Models and Technical Specifications. https:\/\/www.radware.com\/products\/defensepro-models\/ 2026-02-04."},{"key":"e_1_3_2_1_21_1","unstructured":"Huawei Technologies. 2026. HiSecEngine AntiDDoS12000+SecoManager Solution Product Documentation. https:\/\/support.huawei.com\/hedex\/hdx.do?docid=EDOC1100413123&tocURL=resources%2Fhedex-homepage.html 2026-02-01."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663424"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2025.09.260"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.53"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-022-00728-2"},{"key":"e_1_3_2_1_26_1","first-page":"84169","article-title":"Dissect Black Box: Interpreting for Rule-Based Explanations in Unsupervised Anomaly Detection","volume":"37","author":"Zhang Yu","year":"2024","unstructured":"Yu Zhang, Ruoyu Li, Nengwu Wu, Qing Li, Xinhan Lin, Yang Hu, Tao Li, and Yong Jiang. 2024. Dissect Black Box: Interpreting for Rule-Based Explanations in Unsupervised Anomaly Detection. Advances in Neural Information Processing Systems 37 (2024), 84169\u201384196.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25674"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00102"}],"event":{"name":"EuroSys '26: 21st European Conference on Computer Systems","location":"Edinburgh Scotland Uk","acronym":"EuroSec '26","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 19th European Workshop on Systems Security"],"original-title":[],"deposited":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:55:53Z","timestamp":1776351353000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3803525.3804985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,26]]},"references-count":28,"alternative-id":["10.1145\/3803525.3804985","10.1145\/3803525"],"URL":"https:\/\/doi.org\/10.1145\/3803525.3804985","relation":{},"subject":[],"published":{"date-parts":[[2026,4,26]]},"assertion":[{"value":"2026-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}