{"id":"https://openalex.org/W3012065231","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035323","title":"Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack","display_name":"Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012065231","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035323","mag":"3012065231"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa47632.2019.9035323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011728448","display_name":"Zouheir Trabelsi","orcid":"https://orcid.org/0000-0001-8686-8975"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Zouheir Trabelsi","raw_affiliation_strings":["College of Information Technology, UAE University"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060751754","display_name":"Safaa Zeidan","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Safaa Zeidan","raw_affiliation_strings":["College of Information Technology, UAE University"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011728448"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.65995272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8789485692977905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7828787565231323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6969889402389526},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6208104491233826},{"id":"https://openalex.org/keywords/internet-control-message-protocol","display_name":"Internet Control Message Protocol","score":0.5343804359436035},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4999840259552002},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4939749836921692},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.4888593554496765},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44541317224502563},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.43933621048927307},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43289458751678467},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21241897344589233},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.06587415933609009}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8789485692977905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7828787565231323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6969889402389526},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6208104491233826},{"id":"https://openalex.org/C195219913","wikidata":"https://www.wikidata.org/wiki/Q13162","display_name":"Internet Control Message Protocol","level":3,"score":0.5343804359436035},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4999840259552002},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4939749836921692},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.4888593554496765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44541317224502563},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.43933621048927307},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43289458751678467},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21241897344589233},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.06587415933609009},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa47632.2019.9035323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W641746438","https://openalex.org/W1966598757","https://openalex.org/W1987460050","https://openalex.org/W2075274830","https://openalex.org/W2106155062","https://openalex.org/W2112208179","https://openalex.org/W2118179895","https://openalex.org/W2128120508","https://openalex.org/W2132616214","https://openalex.org/W2135369100","https://openalex.org/W2142208964","https://openalex.org/W2150740451","https://openalex.org/W2166271320","https://openalex.org/W2170202072","https://openalex.org/W2341144004","https://openalex.org/W2554936816","https://openalex.org/W2587827963","https://openalex.org/W2737510698","https://openalex.org/W2811214316","https://openalex.org/W2886042450"],"related_works":["https://openalex.org/W117702191","https://openalex.org/W2376613537","https://openalex.org/W2137974073","https://openalex.org/W282637646","https://openalex.org/W3215145745","https://openalex.org/W2078650357","https://openalex.org/W2359471043","https://openalex.org/W2990770217","https://openalex.org/W2930471211","https://openalex.org/W2785762649"],"abstract_inverted_index":{"Traditional":[0],"Distributed":[1],"Denial":[2],"of":[3,21,38,47,77,89,119,159,167],"Service":[4],"(DDoS)":[5],"attacks":[6,49,73],"usually":[7],"flood":[8],"target":[9,39,53],"network":[10,26,55,136],"servers":[11,40],"with":[12,85],"malicious":[13,78],"traffic.":[14,79],"This":[15,80,96,111],"would":[16],"generally":[17],"require":[18],"a":[19],"set":[20],"attack":[22,98,122,125,162,172],"hosts":[23],"and":[24,52,60,127,134,150,175],"large":[25],"traffic":[27],"volume":[28,76],"to":[29,32,67,104,155,165,191],"be":[30],"able":[31],"crash":[33],"or":[34],"degrade":[35],"the":[36,93,106,117,120,135,157,160,197],"performance":[37],"causing":[41],"service":[42],"disruptions.":[43],"Recently,":[44],"new":[45,97],"types":[46],"DDoS":[48,69],"have":[50],"emerged":[51],"specifically":[54],"security":[56],"devices,":[57],"mainly":[58],"firewalls":[59,133,154],"intrusion":[61],"prevention":[62],"systems":[63],"(IPS).":[64],"In":[65,169],"contrast":[66],"traditional":[68],"attacks,":[70],"these":[71],"emerging":[72,87],"use":[74],"low":[75],"paper":[81,112],"is":[82],"concerned":[83],"solely":[84],"an":[86],"denial":[88],"firewalling":[90],"attack,":[91],"called":[92],"BlackNurse":[94,121,161],"attack.":[95,198],"uses":[99],"special":[100],"formatted":[101],"ICMP":[102],"packets":[103],"overwhelm":[105],"CPUs":[107],"on":[108,131,143,182],"targeted":[109],"firewalls.":[110],"offers":[113],"detailed":[114],"insights":[115],"into":[116],"understanding":[118],"principles,":[123],"practical":[124],"generation,":[126],"its":[128],"general":[129],"effect":[130],"impacted":[132],"behind":[137],"them.":[138,168],"Performance":[139],"evaluations":[140],"are":[141,177,187],"conducted":[142],"commercial":[144],"grade":[145],"Juniper":[146,183],"NetScreen":[147,184],"SSG":[148,185],"20":[149,186],"Cisco":[151],"ASA":[152],"5540":[153],"measure":[156],"harmfulness":[158],"when":[163],"subjected":[164],"each":[166],"addition,":[170],"available":[171],"mitigations":[173],"pros":[174],"cons":[176],"discussed.":[178],"OS":[179],"screening":[180],"features":[181],"used,":[188],"as":[189],"example,":[190],"test":[192],"their":[193],"effectiveness":[194],"in":[195],"thwarting":[196]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
