{"id":"https://openalex.org/W4387321750","doi":"https://doi.org/10.1145/3607199.3607238","title":"Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications","display_name":"Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387321750","doi":"https://doi.org/10.1145/3607199.3607238"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607238","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607238","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607238","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051582028","display_name":"Rajat Tandon","orcid":"https://orcid.org/0000-0002-4941-1834"},"institutions":[{"id":"https://openalex.org/I1339145263","display_name":"Juniper Networks (United States)","ror":"https://ror.org/02pwct569","country_code":"US","type":"company","lineage":["https://openalex.org/I1339145263"]},{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajat Tandon","raw_affiliation_strings":["University of Southern California Information Sciences Institute, United States of America and Juniper Networks Inc., USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, United States of America and Juniper Networks Inc., USA","institution_ids":["https://openalex.org/I1339145263","https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073506287","display_name":"Haoda Wang","orcid":"https://orcid.org/0000-0001-9029-8071"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haoda Wang","raw_affiliation_strings":["University of Southern California Information Sciences Institute, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076483970","display_name":"Nicolaas Weideman","orcid":"https://orcid.org/0000-0002-4000-1193"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nicolaas Weideman","raw_affiliation_strings":["University of Southern California Information Sciences Institute, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081720898","display_name":"Shushan Arakelyan","orcid":"https://orcid.org/0000-0002-4079-3952"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shushan Arakelyan","raw_affiliation_strings":["University of Southern California Information Sciences Institute, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087357573","display_name":"Genevieve Bartlett","orcid":"https://orcid.org/0000-0002-8393-9472"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Genevieve Bartlett","raw_affiliation_strings":["University of Southern California Information Sciences Institute, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, United States of America","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028735030","display_name":"Christophe Hauser","orcid":"https://orcid.org/0000-0001-7698-8041"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christophe Hauser","raw_affiliation_strings":["University of Southern California Information Sciences Institute, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, United States of America","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103177278","display_name":"Jelena Mirkovi\u0107","orcid":"https://orcid.org/0000-0001-7462-8747"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"funder","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jelena Mirkovic","raw_affiliation_strings":["University of Southern California Information Sciences Institute, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Southern California Information Sciences Institute, United States of America","institution_ids":["https://openalex.org/I1174212"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.373,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":1,"citation_normalized_percentile":{"value":0.515839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":66,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"744","last_page":"758"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.64150286}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9731848},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.84706783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.74483836},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7320579},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.64150286},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.60183054},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5248799},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4371586},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36638296},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22445959},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.110497475},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607238","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607238","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607238","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607238","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"1815495"}],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W1488996941","https://openalex.org/W1971111941","https://openalex.org/W2066660519","https://openalex.org/W2107363720","https://openalex.org/W2113295783","https://openalex.org/W2119227347","https://openalex.org/W2146325724","https://openalex.org/W2184720590","https://openalex.org/W2308983626","https://openalex.org/W2549994809","https://openalex.org/W2734941459","https://openalex.org/W2764133304","https://openalex.org/W2793353921","https://openalex.org/W2906994751","https://openalex.org/W2946449988","https://openalex.org/W3027887783","https://openalex.org/W3106010854","https://openalex.org/W3127553735","https://openalex.org/W3155666085","https://openalex.org/W3169076764","https://openalex.org/W4237365337","https://openalex.org/W4243563432","https://openalex.org/W4284670904","https://openalex.org/W4306406251","https://openalex.org/W4313531834","https://openalex.org/W4315629939"],"related_works":["https://openalex.org/W4200107511","https://openalex.org/W3207760230","https://openalex.org/W2906845177","https://openalex.org/W2891427086","https://openalex.org/W2536018345","https://openalex.org/W1994311829","https://openalex.org/W1968625315","https://openalex.org/W17155033","https://openalex.org/W1590307681","https://openalex.org/W1496222301"],"abstract_inverted_index":{"Exploit-based":[0],"denial-of-service":[1],"attacks":[2,19,48],"(exDoS)":[3],"are":[4],"challenging":[5],"to":[6,40],"detect":[7],"and":[8,30,64],"mitigate.":[9],"Rather":[10],"than":[11],"flooding":[12],"the":[13],"network":[14],"with":[15,70],"excessive":[16],"traffic,":[17],"these":[18],"generate":[20],"low":[21],"rates":[22],"of":[23,46],"application":[24],"requests":[25],"that":[26],"exploit":[27],"some":[28],"vulnerability":[29],"tie":[31],"up":[32],"a":[33],"scarce":[34],"key":[35],"resource.":[36],"It":[37],"is":[38],"impractical":[39],"design":[41],"defenses":[42],"for":[43],"each":[44],"variant":[45],"exDoS":[47],"separately.":[49],"This":[50],"approach":[51],"does":[52],"not":[53],"scale,":[54],"since":[55],"new":[56,65],"vulnerabilities":[57],"can":[58,67],"be":[59,68],"discovered":[60],"in":[61],"existing":[62],"applications,":[63],"applications":[66],"deployed":[69],"yet":[71],"unknown":[72],"vulnerabilities.":[73]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387321750","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-02-19T15:52:58.031256","created_date":"2023-10-04"}