{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:56:26Z","timestamp":1774454186663,"version":"3.50.1"},"reference-count":23,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055497","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T07:28:33Z","timestamp":1731310113000},"page":"3825-3851","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["A DDoS Identification Method for Unbalanced Data CVWGG"],"prefix":"10.32604","volume":"81","author":[{"given":"Yang","family":"He","sequence":"first","affiliation":[]},{"given":"Haizhen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"5320","DOI":"10.1007\/s11227-019-02945-z","article-title":"Distributed denial of service attacks and its defenses in IoT: A survey","volume":"76","author":"Salim","year":"2019","journal-title":"J. Supercomput."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106432","article-title":"Towards a machine learning-based framework for DDoS attack detection in software-defined IoT (SD-IoT) networks","volume":"123","author":"Bhayo","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"W. Lu and Y. Liu, \u201cA DDoS attack detection method based on information entropy and deep learning in SDN,\u201d presented at IEEE 4th Inf. Technol. Netw. Electr. Autom. Control Conf. (ITNEC), Chongqing, China, 2020, pp. 1084\u20131088A.","DOI":"10.1109\/ITNEC48623.2020.9085007"},{"key":"ref4","series-title":"2021 Int. Wirel. Commun. Mobile Comput. (IWCMC)","first-page":"1030","article-title":"A CGAN-based DDoS attack detection method in SDN","author":"Liu","year":"2021"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"9935","DOI":"10.1007\/s11227-023-05829-5","article-title":"Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks","volume":"80","author":"Qing","year":"2024","journal-title":"J. Supercomput."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","article-title":"Adversarial deep learning approach detection and defense against DDoS attacks in SDN environments","volume":"125","author":"Novaes","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105805","article-title":"GAN-AE: An unsupervised intrusion detection system for MQTT networks","volume":"119","author":"Boppana","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1007\/s11276-022-03182-8","article-title":"Dynamic distributed generative adversarial network for intrusion detection system over internet of things","volume":"29","author":"Balaji","year":"2023","journal-title":"Wirel. Netw."},{"key":"ref9","article-title":"Synthetic attack data generation model applying generative adversarial network for intrusion detection","volume":"125","author":"Kumar","year":"2022","journal-title":"Comput. Secur."},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2020.102177","article-title":"IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks","volume":"105","author":"Huang","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s00779-019-01332-y","article-title":"GAN-based imbalanced data intrusion detection system","volume":"25","author":"Lee","year":"2021","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"190431","DOI":"10.1109\/ACCESS.2020.3031892","article-title":"Network intrusion detection based on conditional Wasserstein generative adversarial network and cost-sensitive stacked autoencoder","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref13","article-title":"Network intrusion detection method based on FCWGAN and BiLSTM","volume":"2022","author":"Ma","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref14","article-title":"Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network","volume":"19","author":"Yang","year":"2019","journal-title":"Sensors"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"13262","DOI":"10.1007\/s11227-023-05171-w","article-title":"B-VAE: A new dataset balancing approach using batched variational AutoEncoders to enhance network intrusion detection","volume":"79","author":"Chuang","year":"2023","journal-title":"J. Supercomput."},{"key":"ref16","first-page":"54","article-title":"Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature","volume":"45","author":"Liu","year":"Feb. 2024","journal-title":"J. Commun."},{"key":"ref17","series-title":"Proc. of the IEEE 53rd Int. Carnahan Conf. Secur. Technol.","article-title":"Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy","author":"Sharafaldin","year":"2019"},{"key":"ref18","series-title":"4th Int. Conf. Inform. Syst. Secur. Privacy (ICISSP)","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"Jan. 2018"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1016\/j.future.2022.12.024","article-title":"A data balancing approach based on generative adversarial network","volume":"141","author":"Yuan","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref20","unstructured":"G. Chen, \u201cResearch on smart home network intrusion detection algorithm based on data enhancement,\u201d M.S. thesis, Beijing Jiaotong Univ., China, 2023. doi: 10.26944\/d.cnki.gbfju.2022.003568."},{"key":"ref21","series-title":"2020 IEEE 44th Ann. Comput., Soft., Appl. Conf. (COMPSAC)","first-page":"817","article-title":"Improving attack detection performance in NIDS using GAN","author":"Li","year":"2020"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103432","article-title":"WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS","volume":"134","author":"Srivastava","year":"2023","journal-title":"Comput. Secur."},{"key":"ref23","first-page":"1","article-title":"An intrusion detection model incorporating improved stacked encoder and multilayer BiLSTM","author":"Chen","year":"2024","journal-title":"Comput. Eng. Appl."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59020\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:02:01Z","timestamp":1741327321000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":23,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055497","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}