{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:57:47Z","timestamp":1725685067186},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3337821.3337856","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T08:34:36Z","timestamp":1564043676000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["When Power Oversubscription Meets Traffic Flood Attack"],"prefix":"10.1145","author":[{"given":"Xiaofeng","family":"Hou","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University"}]},{"given":"Mingyu","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University"}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University"}]},{"given":"Wenli","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University"}]},{"given":"Quan","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University"}]},{"given":"Minyi","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alibaba. 2018. Alibaba Cloud Object Storage Service Trace Data. https:\/\/github.com\/alibaba\/clusterdata. Alibaba. 2018. Alibaba Cloud Object Storage Service Trace Data. https:\/\/github.com\/alibaba\/clusterdata."},{"volume-title":"Worldwide Infrastructure Security Report","key":"e_1_3_2_1_2_1","unstructured":"NetScout Arbor. 2016. Worldwide Infrastructure Security Report : Volume XII . NetScout Arbor. 2016. Worldwide Infrastructure Security Report: Volume XII."},{"volume-title":"Insight into the Global Threat Landscape: NetScout Arbor's 13th Annual Worldwide Infrastructure Security Report","key":"e_1_3_2_1_3_1","unstructured":"NetScout Arbor. 2017. Insight into the Global Threat Landscape: NetScout Arbor's 13th Annual Worldwide Infrastructure Security Report . NetScout Arbor. 2017. Insight into the Global Threat Landscape: NetScout Arbor's 13th Annual Worldwide Infrastructure Security Report."},{"key":"e_1_3_2_1_4_1","unstructured":"BoNeSi. 2019. https:\/\/github.com\/markus-go\/bonesi. BoNeSi. 2019. https:\/\/github.com\/markus-go\/bonesi."},{"key":"e_1_3_2_1_5_1","unstructured":"RioRey Company. 2012. RioRey Taxonomy of DDoS Attacks. http:\/\/www.riorey.com\/x-resources\/2012\/RioReyTaxonomyDDoSAttacks2012.eps. RioRey Company. 2012. RioRey Taxonomy of DDoS Attacks. http:\/\/www.riorey.com\/x-resources\/2012\/RioReyTaxonomyDDoSAttacks2012.eps."},{"key":"e_1_3_2_1_6_1","unstructured":"Pivotal Software Cooperation. 2018. Spring Boot. Pivotal Software Cooperation. 2018. Spring Boot."},{"volume-title":"Intel\u00c2\u0151 64 and IA-32 Architectures Software Developer's Manual","author":"Inter Corporation","key":"e_1_3_2_1_7_1","unstructured":"Inter Corporation . 2016. Intel\u00c2\u0151 64 and IA-32 Architectures Software Developer's Manual . Volume 3B: System Programming Guide, Part 2 . Inter Corporation. 2016. Intel\u00c2\u0151 64 and IA-32 Architectures Software Developer's Manual. Volume 3B: System Programming Guide, Part 2."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2012.6322253"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"B. Hang etal 2009. A Novel SYN Cookie Method for TCP Layer DDoS Attack. In BioMedical Information Engineering. B. Hang et al. 2009. A Novel SYN Cookie Method for TCP Layer DDoS Attack. In BioMedical Information Engineering.","DOI":"10.1109\/FBIE.2009.5405818"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173190"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"C. Li etal 2014. Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters. In JCST. C. Li et al. 2014. Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters. In JCST.","DOI":"10.1007\/s11390-014-1454-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.50"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508269"},{"key":"e_1_3_2_1_14_1","unstructured":"D. M. Nessett etal 1999. Multilayer Firewall System. D. M. Nessett et al. 1999. Multilayer Firewall System."},{"key":"e_1_3_2_1_15_1","unstructured":"D. Woo etal 2007. Analyzing Performance Vulnerability Due to Re-source Denial of Service Attack on Chip Multiprocessors. In CMP-MSI. D. Woo et al. 2007. Analyzing Performance Vulnerability Due to Re-source Denial of Service Attack on Chip Multiprocessors. In CMP-MSI."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254780"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485973"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541966"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.66"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.33"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1242-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.03.010"},{"key":"e_1_3_2_1_23_1","unstructured":"G. Vigna etal 1998. NetSTAT: A Network-based Intru-sion Detection Approach. In ACSAC. G. Vigna et al. 1998. NetSTAT: A Network-based Intru-sion Detection Approach. In ACSAC."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.005"},{"key":"e_1_3_2_1_25_1","unstructured":"K. Yeung etal 2018. Tools for Attacking Lay-er 2 Network Infrastructure. In IAENG. K. Yeung et al. 2018. Tools for Attacking Lay-er 2 Network Infrastructure. In IAENG."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"L. Liu etal 2015. Leveraging Heterogeneous Power for Improving Datacenter Efficiency and Resiliency. In CAL. L. Liu et al. 2015. Leveraging Heterogeneous Power for Improving Datacenter Efficiency and Resiliency. In CAL.","DOI":"10.1109\/LCA.2014.2363084"},{"key":"e_1_3_2_1_27_1","volume-title":"Big-databench: A Big Data Benchmark Suite from Internet Services.","author":"Wang L.","year":"2014","unstructured":"L. Wang 2014 . Big-databench: A Big Data Benchmark Suite from Internet Services. (2014). L. Wang et al. 2014. Big-databench: A Big Data Benchmark Suite from Internet Services. (2014)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"M. Ficco etal 2017. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: a New Generation of Denial-of-service Attacks. In IEEE Systems Journal. M. Ficco et al. 2017. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: a New Generation of Denial-of-service Attacks. In IEEE Systems Journal.","DOI":"10.1109\/JSYST.2015.2414822"},{"key":"e_1_3_2_1_29_1","unstructured":"S. Behal etal 2017. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. In IJ Network Security. S. Behal et al. 2017. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. In IJ Network Security."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000105"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150985"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"T. Boraten etal 2016. Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures. In IPDPS. T. Boraten et al. 2016. Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures. In IPDPS.","DOI":"10.1109\/IPDPS.2016.59"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"T. Martin etal 2004. Denial-of-service Attacks on Battery-powered Mobile Computers. In PerCom. T. Martin et al. 2004. Denial-of-service Attacks on Battery-powered Mobile Computers. In PerCom.","DOI":"10.1109\/PERCOM.2004.1276868"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250665"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"X. Hou etal 2018. Power Grab in Aggressively Provisioned Data Centers: What is the Risk and What Can Be Done About It. In ICCD. X. Hou et al. 2018. Power Grab in Aggressively Provisioned Data Centers: What is the Risk and What Can Be Done About It. In ICCD.","DOI":"10.1109\/ICCD.2018.00015"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064253"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925628"},{"key":"e_1_3_2_1_39_1","unstructured":"Zaf etal 2018. A Lightweight Bash Shell Script Designed to Block DoS Attacks. Zaf et al. 2018. A Lightweight Bash Shell Script Designed to Block DoS Attacks."},{"key":"e_1_3_2_1_40_1","unstructured":"Z. He etal 2017. Host-Based Dos Attacks and Defense in the Cloud. In HASP. Z. He et al. 2017. Host-Based Dos Attacks and Defense in the Cloud. In HASP."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Z. He etal 2017. Machine Learning Based DDoS Attack Detection from Source Side in Cloud. In CSCloud. Z. He et al. 2017. Machine Learning Based DDoS Attack Detection from Source Side in Cloud. In CSCloud.","DOI":"10.1109\/CSCloud.2017.58"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.70"},{"key":"e_1_3_2_1_43_1","volume-title":"Power Attack: An Increasing Threat to Data Centers. In NDSS.","author":"Xu Z.","year":"2014","unstructured":"Z. Xu 2014 . Power Attack: An Increasing Threat to Data Centers. In NDSS. Z. Xu et al. 2014. Power Attack: An Increasing Threat to Data Centers. In NDSS."},{"key":"e_1_3_2_1_44_1","unstructured":"The Apache Software Foundation. 2018. ab-Apache HTTP Server Benchmarking Tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html. The Apache Software Foundation. 2018. ab-Apache HTTP Server Benchmarking Tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html."},{"key":"e_1_3_2_1_45_1","unstructured":"Google. 2016. Best Practices for DDoS Protection and Mitigation on Google Cloud Platform. Google. 2016. Best Practices for DDoS Protection and Mitigation on Google Cloud Platform."},{"key":"e_1_3_2_1_46_1","unstructured":"IBM. 2016. POWER8 Processor Datasheet for the Single-Chip Module. IBM. 2016. POWER8 Processor Datasheet for the Single-Chip Module."},{"volume-title":"The Cost of Denial of Service Attacks","author":"Ponemon Institute","key":"e_1_3_2_1_47_1","unstructured":"Ponemon Institute . 2016. The Cost of Denial of Service Attacks ( Data Center Performance Benchmark Series . Ponemon Institute. 2016. The Cost of Denial of Service Attacks (Data Center Performance Benchmark Series."},{"key":"e_1_3_2_1_48_1","unstructured":"M. Kumar. 2011. DDOSIM Layer 7 DDoS Simulator. https:\/\/thehackernews.com\/2011\/01\/ddosim-layer-7-ddos-simulator.html. M. Kumar. 2011. DDOSIM Layer 7 DDoS Simulator. https:\/\/thehackernews.com\/2011\/01\/ddosim-layer-7-ddos-simulator.html."},{"key":"e_1_3_2_1_49_1","unstructured":"Netstress. 2019. https:\/\/netstress.org\/. Netstress. 2019. https:\/\/netstress.org\/."},{"key":"e_1_3_2_1_50_1","unstructured":"Verisign. 2016. Verisign Distributed Denial of Service Trends Report. Verisign. 2016. Verisign Distributed Denial of Service Trends Report."},{"key":"e_1_3_2_1_51_1","unstructured":"In ACME Labs Webmaster. 2016. Multiprocessing http Test Client. https:\/\/acme.com\/software\/http_load\/. In ACME Labs Webmaster. 2016. Multiprocessing http Test Client. https:\/\/acme.com\/software\/http_load\/."}],"event":{"name":"ICPP 2019: 48th International Conference on Parallel Processing","sponsor":["University of Tsukuba University of Tsukuba"],"location":"Kyoto Japan","acronym":"ICPP 2019"},"container-title":["Proceedings of the 48th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337821.3337856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T14:23:20Z","timestamp":1673965400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337856"}},"subtitle":["Re-Thinking Data Center Peak Load Management"],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":51,"alternative-id":["10.1145\/3337821.3337856","10.1145\/3337821"],"URL":"https:\/\/doi.org\/10.1145\/3337821.3337856","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}