{"id":"https://openalex.org/W2594198820","doi":"https://doi.org/10.1504/ijics.2017.10003606","title":"Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services","display_name":"Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2594198820","doi":"https://doi.org/10.1504/ijics.2017.10003606","mag":"2594198820"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2017.10003606","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024122659","display_name":"N.A. Velmurugan","orcid":null},"institutions":[{"id":"https://openalex.org/I4387152551","display_name":"Society for Electronic Transactions and Security","ror":"https://ror.org/03zdc1b30","country_code":null,"type":"nonprofit","lineage":["https://openalex.org/I4387152551"]}],"countries":[],"is_corresponding":false,"raw_author_name":"N.A. Velmurugan","raw_affiliation_strings":["Society for Electronic Transactions and Security (SETS), Chennai, India"],"affiliations":[{"raw_affiliation_string":"Society for Electronic Transactions and Security (SETS), Chennai, India","institution_ids":["https://openalex.org/I4387152551"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026206532","display_name":"Lakshmi Kuppusamy","orcid":"https://orcid.org/0000-0001-8902-0718"},"institutions":[{"id":"https://openalex.org/I4387152551","display_name":"Society for Electronic Transactions and Security","ror":"https://ror.org/03zdc1b30","country_code":null,"type":"nonprofit","lineage":["https://openalex.org/I4387152551"]}],"countries":[],"is_corresponding":false,"raw_author_name":"Lakshmi Kuppusamy","raw_affiliation_strings":["Society for Electronic Transactions and Security (SETS), Chennai, India"],"affiliations":[{"raw_affiliation_string":"Society for Electronic Transactions and Security (SETS), Chennai, India","institution_ids":["https://openalex.org/I4387152551"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111445006","display_name":"Gopi Krishnan","orcid":null},"institutions":[{"id":"https://openalex.org/I4387152551","display_name":"Society for Electronic Transactions and Security","ror":"https://ror.org/03zdc1b30","country_code":null,"type":"nonprofit","lineage":["https://openalex.org/I4387152551"]}],"countries":[],"is_corresponding":false,"raw_author_name":"Gopi Krishnan","raw_affiliation_strings":["Society for Electronic Transactions and Security (SETS), Chennai, India"],"affiliations":[{"raw_affiliation_string":"Society for Electronic Transactions and Security (SETS), Chennai, India","institution_ids":["https://openalex.org/I4387152551"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055471969","display_name":"Jothi Rangasamy","orcid":"https://orcid.org/0000-0001-9830-021X"},"institutions":[{"id":"https://openalex.org/I4387152551","display_name":"Society for Electronic Transactions and Security","ror":"https://ror.org/03zdc1b30","country_code":null,"type":"nonprofit","lineage":["https://openalex.org/I4387152551"]}],"countries":[],"is_corresponding":false,"raw_author_name":"Jothi Rangasamy","raw_affiliation_strings":["Society for Electronic Transactions and Security (SETS), Chennai, India"],"affiliations":[{"raw_affiliation_string":"Society for Electronic Transactions and Security (SETS), Chennai, India","institution_ids":["https://openalex.org/I4387152551"]}]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.500057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":63,"max":71},"biblio":{"volume":"9","issue":"1/2","first_page":"114","last_page":"114"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.5617762},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.554405},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5308372},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.42924127}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8790257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8399727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.78214943},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6025002},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.57705086},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.5617762},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.554405},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5362655},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5308372},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.47617024},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44217965},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4328145},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.42924127},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.41945797},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.40455043},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36733454},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30241907},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13592312},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09801164},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2017.10003606","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W118842186","https://openalex.org/W1537258151","https://openalex.org/W1548440180","https://openalex.org/W1601379374","https://openalex.org/W1675137049","https://openalex.org/W1786974996","https://openalex.org/W1879549110","https://openalex.org/W2062706606","https://openalex.org/W2081357650","https://openalex.org/W2130881858","https://openalex.org/W2130956565","https://openalex.org/W2156954980","https://openalex.org/W2171715320","https://openalex.org/W2187360174"],"related_works":["https://openalex.org/W3139424672","https://openalex.org/W3003217113","https://openalex.org/W2376400759","https://openalex.org/W2186473821","https://openalex.org/W2105340904","https://openalex.org/W2070220341","https://openalex.org/W2049015391","https://openalex.org/W2019615787","https://openalex.org/W2006319822","https://openalex.org/W137484949"],"abstract_inverted_index":{"Denial-of-service":[0],"(DoS)":[1],"attacks":[2,66],"are":[3],"a":[4,23,36,46,59,69],"fast":[5],"growing,":[6],"severe":[7],"menace":[8],"to":[9,34,44,52,57,64],"the":[10,20,42,75,90,100],"availability":[11],"of":[12,22],"desired":[13],"services.":[14],"In":[15],"this":[16],"work,":[17],"we":[18,81],"investigate":[19],"efficacy":[21],"cryptographic":[24],"DoS":[25,65],"countermeasure,":[26],"namely,":[27],"client":[28,43],"puzzles":[29,83],"which":[30],"can":[31],"be":[32],"used":[33],"achieve":[35],"weak":[37],"authentication":[38],"as":[39],"it":[40],"forces":[41],"solve":[45],"somewhat-difficult":[47],"computational":[48],"problem":[49],"in":[50,98],"order":[51],"get":[53],"serviced.":[54],"We":[55],"aim":[56],"make":[58],"web":[60,101],"service":[61,76],"more":[62],"resilient":[63],"by":[67],"using":[68],"reverse":[70,85],"proxy":[71,86],"between":[72],"clients":[73],"and":[74,87,96,106],"provider.":[77],"Unlike":[78],"previous":[79],"works,":[80],"integrate":[82],"into":[84],"demonstrate":[88],"that":[89],"proposed":[91],"approach":[92],"is":[93],"indeed":[94],"effective":[95],"advantageous":[97],"protecting":[99],"servers":[102],"from":[103],"both":[104],"flooding":[105],"semantic-type":[107],"attacks.":[108]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2594198820","counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-01-20T22:13:26.961176","created_date":"2017-03-16"}