{"id":"https://openalex.org/W2754163055","doi":"https://doi.org/10.1109/icws.2017.58","title":"Characterizing the Impacts of Application Layer DDoS Attacks","display_name":"Characterizing the Impacts of Application Layer DDoS Attacks","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2754163055","doi":"https://doi.org/10.1109/icws.2017.58","mag":"2754163055"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icws.2017.58","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067240337","display_name":"Muhui Jiang","orcid":"https://orcid.org/0000-0003-2196-6894"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Muhui Jiang","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455048","display_name":"Chenxu Wang","orcid":"https://orcid.org/0000-0002-9539-5046"},"institutions":[{"id":"https://openalex.org/I97750245","display_name":"Software (Spain)","ror":"https://ror.org/02ethns06","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210087817","https://openalex.org/I97750245"]},{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN","ES","HK"],"is_corresponding":false,"raw_author_name":"Chenxu Wang","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University","School of Software, Xi'an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"School of Software, Xi'an Jiaotong University","institution_ids":["https://openalex.org/I97750245","https://openalex.org/I87445476"]},{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056912431","display_name":"MiuTung Miu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127430","display_name":"Lucky Technology (China)","ror":"https://ror.org/0341fmf68","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210127430"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"MiuTung Miu","raw_affiliation_strings":["Nexusguard Inc, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Nexusguard Inc, Hong Kong","institution_ids":["https://openalex.org/I4210127430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100443178","display_name":"Ting Chen","orcid":"https://orcid.org/0000-0001-9165-8331"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Ting Chen","raw_affiliation_strings":["Cybersecurity Research Center, University of Electronic Science and Technology of China, China","Department of Computing, Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Center, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.061,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":20,"citation_normalized_percentile":{"value":0.999865,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"17","issue":null,"first_page":"500","last_page":"507"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.8975429},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.78892875},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.602803}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9641532},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.92318356},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.8975429},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.78892875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7719461},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7295395},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.6244123},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.602803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5742873},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.54708934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3869451},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20070651},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16185033},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.12043083}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icws.2017.58","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.76,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1508882636","https://openalex.org/W1606848373","https://openalex.org/W1766291720","https://openalex.org/W1968969115","https://openalex.org/W1972458709","https://openalex.org/W1981055536","https://openalex.org/W1990680872","https://openalex.org/W1998576727","https://openalex.org/W2012498489","https://openalex.org/W2022213562","https://openalex.org/W2023506121","https://openalex.org/W2023740829","https://openalex.org/W2025816575","https://openalex.org/W2050842491","https://openalex.org/W2062706606","https://openalex.org/W2064048730","https://openalex.org/W2087766914","https://openalex.org/W2101107338","https://openalex.org/W2107525167","https://openalex.org/W2117975184","https://openalex.org/W2124589355","https://openalex.org/W2127605496","https://openalex.org/W2132914092","https://openalex.org/W2134598092","https://openalex.org/W2149696968","https://openalex.org/W2155087074","https://openalex.org/W2159577123","https://openalex.org/W2163596216","https://openalex.org/W2187970900","https://openalex.org/W2276950046","https://openalex.org/W2281120889","https://openalex.org/W2288803724","https://openalex.org/W2608183811","https://openalex.org/W4230822993","https://openalex.org/W4361785283"],"related_works":["https://openalex.org/W4254515188","https://openalex.org/W3005836778","https://openalex.org/W2954653956","https://openalex.org/W2908108831","https://openalex.org/W2784282778","https://openalex.org/W2754163055","https://openalex.org/W2591571751","https://openalex.org/W2552641916","https://openalex.org/W2375951120","https://openalex.org/W2070220341"],"abstract_inverted_index":{"Distributed":[0],"Denial":[1],"of":[2,41,51,61,86,104,166],"Service":[3],"(DDoS)":[4],"attacks":[5,21,68,74,129,143],"are":[6,25,194],"still":[7],"among":[8],"the":[9,14,39,49,59,72,102,164,174,183,191],"most":[10],"urgent":[11],"threats":[12],"to":[13,33,81,99,110,124,138,181],"modern":[15],"Internet.":[16],"Recently,":[17],"application":[18,62,89],"layer":[19,63,90],"DDoS":[20,43,64,91,128,136,142,168,188],"against":[22,69,78,130,144],"web":[23,52,105],"servers":[24,106],"becoming":[26],"popular,":[27],"resulting":[28],"in":[29,150],"great":[30],"revenue":[31],"losses":[32],"victims.":[34],"A":[35],"systematic":[36],"evaluation":[37],"on":[38],"impacts":[40,60,165,193],"different":[42,127,141,167,187],"attack":[44,192,201],"methods":[45],"is":[46,179],"vital":[47],"for":[48],"protection":[50],"servers.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57,93,161],"examine":[58],"attacks,":[65,92],"including":[66],"existing":[67,122],"HTTP/1.1":[70,131],"and":[71,107,113,119,132,159,200],"new":[73,96,135,175],"proposed":[75],"by":[76,186,196],"us":[77],"HTTP/2.0.":[79,145],"Moreover,":[80,190],"better":[82],"understand":[83],"attackers'":[84],"capabilities":[85],"launching":[87],"severe":[88],"design":[94],"a":[95,108,134,151],"measurement":[97,177],"method":[98,109,178],"remotely":[100],"infer":[101],"performance":[103],"differentiate":[111],"dynamic":[112],"static":[114],"URLs.":[115],"We":[116],"have":[117],"collected":[118],"tailored":[120],"4":[121],"tools":[123],"launch":[125],"5":[126,140],"developed":[133],"tool":[137],"perform":[139],"By":[146],"conducting":[147],"extensive":[148],"experiments":[149],"testbed":[152],"with":[153],"two":[154],"e-commercial":[155],"websites":[156],"running":[157],"Apache":[158],"Nginx,":[160],"carefully":[162],"evaluate":[163],"attacks.":[169,189],"The":[170],"results":[171],"show":[172],"that":[173],"remote":[176],"able":[180],"detect":[182],"effects":[184],"caused":[185],"affected":[195],"URLs,":[197],"server":[198],"architectures,":[199],"methods.":[202]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2754163055","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2}],"updated_date":"2024-12-12T13:42:53.171111","created_date":"2017-09-25"}