{"id":"https://openalex.org/W101545712","doi":"https://doi.org/10.1007/978-3-662-44885-4_6","title":"Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems","display_name":"Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W101545712","doi":"https://doi.org/10.1007/978-3-662-44885-4_6","mag":"101545712"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-44885-4_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-44885-4_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44885-4_6.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44885-4_6.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026474262","display_name":"Suaad Alarifi","orcid":"https://orcid.org/0000-0001-9753-1251"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]},{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB","SA"],"is_corresponding":true,"raw_author_name":"Suaad Alarifi","raw_affiliation_strings":["Information Security Group, Department of Mathematics, Royal Holloway, University of London, UK","King Abdulaziz University, Jeddah, Saudi Arabia","King Abdulaziz University","Royal Holloway [University of London]"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Department of Mathematics, Royal Holloway, University of London, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"King Abdulaziz University","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Royal Holloway [University of London]","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013455841","display_name":"Stephen D. Wolthusen","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stephen Wolthusen","raw_affiliation_strings":["Information Security Group, Department of Mathematics, Royal Holloway, University of London, UK","Norwegian Information Security Laboratory, Department of Computer Science, Gj\u00f8vik University College, Norway","Royal Holloway [University of London]","Gj\u00f8vik University College"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Department of Mathematics, Royal Holloway, University of London, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Norwegian Information Security Laboratory, Department of Computer Science, Gj\u00f8vik University College, Norway","institution_ids":[]},{"raw_affiliation_string":"Royal Holloway [University of London]","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Gj\u00f8vik University College","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026474262"],"corresponding_institution_ids":["https://openalex.org/I184558857","https://openalex.org/I185163786"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04098124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8800976276397705},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8432161211967468},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.578641414642334},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5371454954147339},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5364177227020264},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.49896907806396484},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.455375999212265},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4489063322544098},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4462253451347351},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.4414192736148834},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19877466559410095},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14646926522254944}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8800976276397705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8432161211967468},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.578641414642334},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5371454954147339},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5364177227020264},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.49896907806396484},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.455375999212265},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4489063322544098},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4462253451347351},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.4414192736148834},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19877466559410095},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14646926522254944},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-662-44885-4_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-44885-4_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44885-4_6.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01404188v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01404188","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.73-85, &#x27E8;10.1007/978-3-662-44885-4_6&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-662-44885-4_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-44885-4_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44885-4_6.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W101545712.pdf","grobid_xml":"https://content.openalex.org/works/W101545712.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W105993467","https://openalex.org/W2021204974","https://openalex.org/W2037195664","https://openalex.org/W2110374615","https://openalex.org/W2119028650","https://openalex.org/W2137576376","https://openalex.org/W2165666960","https://openalex.org/W2167088175","https://openalex.org/W2169461225","https://openalex.org/W3124157346","https://openalex.org/W4206109607","https://openalex.org/W4239783050","https://openalex.org/W4293315144"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W986318368","https://openalex.org/W2765763546","https://openalex.org/W2000785801","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2547038763","https://openalex.org/W572531444","https://openalex.org/W2921575628","https://openalex.org/W2174174426"],"abstract_inverted_index":{"Public":[0],"IaaS":[1],"cloud":[2,13,59,81,110,129],"environments":[3],"are":[4,69,98],"vulnerable":[5],"to":[6,46,71,77,91,113,151,168,184],"misbehaving":[7],"applications":[8],"and":[9,17,79,93,131,190],"virtual":[10],"machines.":[11],"Moreover,":[12],"service":[14],"availability,":[15],"reliability,":[16],"ultimately":[18],"reputation":[19],"is":[20,31,89,140],"specifically":[21],"at":[22],"risk":[23],"from":[24],"Denial":[25],"of":[26,53,63,87,166],"Service":[27],"forms":[28],"as":[29],"it":[30],"based":[32],"on":[33],"resource":[34,104],"over-commitment.":[35],"In":[36],"this":[37],"paper,":[38],"we":[39],"describe":[40],"a":[41,73,141,153,163,173,181,195],"stealthy":[42],"randomised":[43],"probing":[44],"strategy":[45],"learn":[47,119],"thresholds":[48,68],"used":[49,70,150],"in":[50,57],"the":[51,58,114,120,125,128,133,159,186,192],"process":[52],"taking":[54],"migration":[55,64,177],"decisions":[56],"(i.e.":[60],"reverse":[61],"engineering":[62],"algorithms).":[65],"These":[66],"discovered":[67],"design":[72,152,172],"more":[74],"efficient,":[75],"harder":[76],"detect,":[78],"robust":[80],"DoS":[82,155,197],"attack":[83,156],"family.":[84],"A":[85],"sequence":[86],"tests":[88],"designed":[90],"extract":[92,185],"reveal":[94],"these":[95,97,137],"thresholds;":[96],"performed":[99],"by":[100,123,144,157],"coordinating":[101],"stealthily":[102],"increased":[103,115],"consumption":[105],"among":[106],"attackers":[107],"whilst":[108],"observing":[109,127],"management":[111],"reactions":[112],"demand.":[116],"We":[117,171],"can":[118,148],"required":[121,187],"parameters":[122,139],"repeating":[124],"tests,":[126],"reactions,":[130],"analysing":[132],"observations":[134],"statistically.":[135],"Revealing":[136],"hidden":[138,188],"security":[142],"breach":[143],"itself;":[145],"furthermore,":[146],"they":[147],"be":[149],"hard-to-detect":[154],"stressing":[158],"host":[160],"resources":[161],"using":[162],"precise":[164],"amount":[165],"workload":[167],"trigger":[169],"migration.":[170],"formal":[174],"model":[175],"for":[176],"decision":[178],"processes,":[179],"create":[180],"dynamic":[182],"algorithm":[183],"parameters,":[189],"demonstrate":[191],"utility":[193],"with":[194],"specimen":[196],"attack.":[198]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
