{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:20:35Z","timestamp":1776784835619,"version":"3.51.2"},"reference-count":20,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061426","type":"journal-article","created":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:15:57Z","timestamp":1748405757000},"page":"1659-1679","source":"Crossref","is-referenced-by-count":4,"title":["TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection"],"prefix":"10.32604","volume":"84","author":[{"given":"Hanqing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Xue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiyuan","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Puming","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"103996","article-title":"FP-growth-based signature extraction and unknown variants of DoS\/DDoS attack detection on real-time data stream","volume":"89","author":"Srivastava","year":"2025","journal-title":"J Inf Secur Appl"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"438","DOI":"10.11591\/eei.v14i1.8377","article-title":"Distributed denial-of-service attack detection short review: issues, challenges, and recommendations","volume":"14","author":"Habib","year":"2025","journal-title":"Bulletin Electr Eng Inform"},{"key":"ref3","first-page":"3265","article-title":"An adaptive DDoS detection and classification method in blockchain using an integrated multi-models","volume":"77","author":"Li","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref4","first-page":"3655","article-title":"Machine learning enabled novel real-time iot targeted DoS\/DDoS cyber attack detection system","volume":"80","author":"Alabdulatif","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3203","DOI":"10.1016\/j.comcom.2007.05.061","article-title":"Detecting Denial-of-Service attacks using the wavelet transform","volume":"30","author":"Hamdi","year":"2007","journal-title":"Comput Commun"},{"key":"ref6","series-title":"12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","first-page":"233","article-title":"DDoS attack detection at local area networks using information theoretical metrics","author":"Tao","year":"2013"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s11760-015-0796-y","article-title":"An improvement of the state-of-the-art covariance-based methods for statistical anomaly detection algorithms","volume":"10","author":"Fortunati","year":"2016","journal-title":"Signal Image Video Process"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"108503","DOI":"10.1016\/j.comnet.2021.108503","article-title":"Network anomaly detection based on tensor decomposition","volume":"200","author":"Streit","year":"2021","journal-title":"Comput Netw"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"107471","DOI":"10.1016\/j.future.2024.07.049","article-title":"IDAD: an improved tensor train based distributed DDoS attack detection framework and its application in complex networks","volume":"162","author":"Fan","year":"2025","journal-title":"Future Gener Comput Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"85792","DOI":"10.1109\/ACCESS.2022.3197651","article-title":"Tensor-based online network anomaly detection and diagnosis","volume":"10","author":"Shajari","year":"2022","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.future.2023.09.035","article-title":"An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection","volume":"151","author":"Ye","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"5817","DOI":"10.1109\/TIFS.2023.3318960","article-title":"Toward early and accurate network intrusion detection using graph embedding","volume":"18","author":"Hu","year":"2023","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"ref13","series-title":"2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)","first-page":"1","article-title":"Elevating IDS capabilities: the convergence of SVM, Deep learning, and RFECV in network security","author":"Kumar"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1137\/07070111X","article-title":"Tensor decompositions and applications","volume":"51","author":"Kolda","year":"2009","journal-title":"SIAM Review"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/TNSM.2024.3464729","article-title":"BDIP: an efficient big data-driven information processing framework and its application in DDoS attack detection","volume":"22","author":"Fan","year":"2025","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref16","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"785","article-title":"XGBoost: a scalable tree boosting system","author":"Chen","year":"2016"},{"key":"ref17","series-title":"Proceedings of 7th International Conference on Harmony Search, Soft Computing and Applications: ICHSA 2022","first-page":"395","article-title":"Evaluating the performance of LSTM and GRU in detection of distributed denial of service attacks using CICDDoS2019 dataset","author":"Subrmanian","year":"2022"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"102894","DOI":"10.1016\/j.jnca.2020.102894","article-title":"Tensor based framework for distributed denial of Service attack detection","volume":"174","author":"Maranh\u00e3o","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/TNSE.2022.3205708","article-title":"Multi-modal noise-robust DDoS attack detection architecture in large-scale networks based on tensor SVD","volume":"10","author":"Xu","year":"2022","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"4689","DOI":"10.1109\/TNSE.2024.3368048","article-title":"Truncated lanczos-TSVD: an effective dimensionality reduction algorithm for detecting DDoS attacks in large-scale networks","volume":"11","author":"Li","year":"2024","journal-title":"IEEE Trans Netw Sci Eng"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_61426\/TSP_CMC_61426.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:12Z","timestamp":1763343252000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061426","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}