{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T06:56:17Z","timestamp":1776322577380,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T00:00:00Z","timestamp":1540166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFC0820700"],"award-info":[{"award-number":["2017YFC0820700"]}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["KJ-17-101"],"award-info":[{"award-number":["KJ-17-101"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Foundation of Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1267-2","type":"journal-article","created":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T12:18:57Z","timestamp":1540210737000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system"],"prefix":"10.1186","volume":"2018","author":[{"given":"Xingshuo","family":"An","sequence":"first","affiliation":[]},{"given":"Jingtao","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xing","family":"L\u00fc","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5287-5226","authenticated-orcid":false,"given":"Fuhong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,22]]},"reference":[{"key":"1267_CR1","doi-asserted-by":"crossref","unstructured":"Bonomi, F, et al. Fog computing and its role in the internet of things. Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"issue":"5","key":"1267_CR2","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"W. Shi et al., Edge computing: Vision and challenges. IEEE Internet of Things Journal 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"1267_CR3","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/CC.2015.7224698","volume":"12","author":"S Jingtao","year":"2015","unstructured":"S. Jingtao et al., Steiner tree based optimal resource caching scheme in fog computing. China Communications 12(8), 161\u2013168 (2015)","journal-title":"China Communications"},{"issue":"2","key":"1267_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"A. Alrawais et al., Fog computing for the internet of things: security and privacy issues. IEEE Internet Computing 21(2), 34\u201342 (2017)","journal-title":"IEEE Internet Computing"},{"key":"1267_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6285719","volume":"2018","author":"Yan Huo","year":"2018","unstructured":"Y. Huo, C. Yong, Y. Lu, Re-ADP: real-time data aggregation with adaptive w-event differential privacy for fog computing. Wireless Communications and Mobile Computing, 1\u201313 (2018)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"1267_CR6","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"R. Roman, J. Lopez, M. Mambo, Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Generation Computer Systems 78, 680\u2013698 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"1267_CR7","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/MWC.2017.1700015","volume":"25","author":"Y Huo","year":"2018","unstructured":"Y. Huo, Y. Tian, L. Ma, X. Cheng, T. Jing, Jamming strategies for physical layer security. IEEE Wireless Communications 25(1), 148\u2013153 (2018)","journal-title":"IEEE Wireless Communications"},{"key":"1267_CR8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"DE Denning","year":"1987","unstructured":"D.E. Denning, An intrusion-detection model. IEEE Transactions on software engineering 2, 222\u2013232 (1987)","journal-title":"IEEE Transactions on software engineering"},{"key":"1267_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7472095","volume":"2018","author":"X An","year":"2018","unstructured":"X. An et al., Sample selected extreme learning machine based intrusion detection in fog computing and MEC. Wireless Communications & Mobile Computing 2018, 1\u201310 (2018)","journal-title":"Wireless Communications & Mobile Computing"},{"key":"1267_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/1821804","volume":"2018","author":"Xingshuo An","year":"2018","unstructured":"X. An, F. Lin, S. Xu, L. Miao, and G. Chao, \u201cA Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing,\u201d. Security and Communication Networks 2018, 9 (2018). \n                    https:\/\/doi.org\/10.1155\/2018\/1821804","journal-title":"Security and Communication Networks"},{"key":"1267_CR11","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I, and Sheng W. The fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS) 2014 Federated conference on. IEEE (2014).","DOI":"10.15439\/2014F503"},{"key":"1267_CR12","doi-asserted-by":"crossref","unstructured":"C. Thota et al., Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things. IGI Global, 141\u2013154 (2018)","DOI":"10.4018\/978-1-5225-2947-7.ch011"},{"issue":"10","key":"1267_CR13","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"I. Stojmenovic et al., An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience 28(10), 2991\u20133005 (2016)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"3","key":"1267_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.4018\/IJESMA.2018070104","volume":"10","author":"D Chaudhary","year":"2018","unstructured":"D. Chaudhary, K. Bhushan, B.B. Gupta, Survey on DDoS attacks and defense mechanisms in cloud and fog computing. International Journal of E-Services and Mobile Applications (IJESMA) 10(3), 61\u201383 (2018)","journal-title":"International Journal of E-Services and Mobile Applications (IJESMA)"},{"key":"1267_CR15","doi-asserted-by":"crossref","unstructured":"Alharbi, S, et al. FOCUS: A fog computing-based security system for the Internet of Things. Proceedings of the IEEE Consumer Communications & NETWORKING Conference IEEE, (2018):1\u20135","DOI":"10.1109\/CCNC.2018.8319238"},{"issue":"2","key":"1267_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","volume":"56","author":"Q Yan","year":"2018","unstructured":"Q. Yan et al., A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun. Mag. 56(2), 30\u201336 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"1267_CR17","doi-asserted-by":"crossref","unstructured":"Deepali, and K Bhushan. DDoS attack defense framework for cloud using fog computing. Proceedings of the IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology IEEE, (2017):534\u2013538","DOI":"10.1109\/RTEICT.2017.8256654"},{"key":"1267_CR18","unstructured":"J. Xu, L. Chen, K. Liu, and C. Shen, Less is more: participation incentives in D2D-enhanced mobile edge computing under infectious DDoS attacks, arXiv (2017) [Online]. Available: \n                    http:\/\/arxiv.org\/abs\/1611.03841"},{"issue":"6","key":"1267_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MCE.2018.2851723","volume":"7","author":"Fuhong Lin","year":"2018","unstructured":"F. Lin, Y. Zhou, X. An, I. You and K. R. Choo, Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices. IEEE Consum. Electron. Mag.\u00a0 7(6), 45\u201350 (2018).\n                    https:\/\/doi.org\/10.1109\/MCE.2018.2851723","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"3","key":"1267_CR20","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1108\/K-03-2016-0048","volume":"46","author":"R Liang","year":"2017","unstructured":"R. Liang, W. Guo, D. Yang, Mining product problems from online feedback of Chinese users. Kybernetes 46(3), 572\u2013586 (2017)","journal-title":"Kybernetes"},{"key":"1267_CR21","doi-asserted-by":"crossref","unstructured":"Ishii, H, Y Kishiyama, and H Takahashi. A Novel Architecture for LTE-B: C-Plane\/U-Plane Split and Phantom Cell Concept. Globecom Workshops (GC Wkshps), IEEE. (2012)","DOI":"10.1109\/GLOCOMW.2012.6477646"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1267-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1267-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1267-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T20:04:50Z","timestamp":1571688290000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1267-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,22]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1267"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1267-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,22]]},"assertion":[{"value":"31 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Xingshuo An received his master degree from University of Science and Technology Beijing, in 2014. He is currently a PhD student in School of Computer and Communication Engineering, University of Science and Technology Beijing, People\u2019s Republic of China. His research direction is fog computing and network security.Jingtao Su is a PhD student of university of Science and Technology Beijing. His research interests include fog computing and satellite network.Xing L\u00fc received his PhD degree from Beijing University of Posts and Telecommunications, Beijing, P. R. China, in 2012, in computer science and technology. Now he is a professor in department of Computer and Communication Engineering, University of Science and Technology Beijing, People\u2019s Republic of China. China. His research interests include fog computing, soliton theory, symbolic computation and optical soliton communication.Fuhong Lin, received his M.S. degree and Ph.D. degree from Beijing Jiaotong University, Beijing, People\u2019s Republic of China, in 2006 and 2010, respectively, both in electronics engineering. Now, he is an associate professor in the Department of Computer and Communication Engineering, University of Science and Technology Beijing, People\u2019s Republic of China. His research interests include edge\/fog computing, network security, and big data. He won \u201cProvincial and Ministry Science and Technology Progress Award 2\u201d in 2017. His two papers won \u201cTop 100 most Cited Chinese Papers Published in International Journals\u201d in 2015 and 2016. He served as the co-chair of the first and third IET International Conference on Cyberspace Technology and general chair of the second IET International Conference on Cyberspace Technology. He was the leading editor of the special issue \u201cRecent Advances in Cloud-Aware Mobile Fog Computing\u201d for Wireless Communications and Mobile Computing. Currently, he also serves as a reviewer more than 10 international journals including IEEE Transactions on Industrial Informatics, IEEE Access, Information Sciences, IEEE Internet of Things Journal, The Computer Journal and China Communications. He received the track Best Paper Award from IEEE\/ACM ICCAD 2017.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Authors\u2019 information"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"249"}}