{"id":"https://openalex.org/W2145337889","doi":"https://doi.org/10.1109/cdc.2010.5717825","title":"Control of low-rate denial-of-service attacks on web servers and TCP flows","display_name":"Control of low-rate denial-of-service attacks on web servers and TCP flows","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2145337889","doi":"https://doi.org/10.1109/cdc.2010.5717825","mag":"2145337889"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2010.5717825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2010.5717825","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"49th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103175086","display_name":"Qing Hui","orcid":"https://orcid.org/0000-0001-9488-5257"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qing Hui","raw_affiliation_strings":["Department of Mechanical Engineering, Texas Tech University, Lubbock, TX, USA","Department of Mechanical Engineering, Texas Tech University, Lubbock, 79409-1021, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]},{"raw_affiliation_string":"Department of Mechanical Engineering, Texas Tech University, Lubbock, 79409-1021, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA","School of Computer Science, Georgia Institute of Technology, Atlanta, 30332 USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"School of Computer Science, Georgia Institute of Technology, Atlanta, 30332 USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA","School of Computer Science, Georgia Institute of Technology, Atlanta, 30332 USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"School of Computer Science, Georgia Institute of Technology, Atlanta, 30332 USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103175086"],"corresponding_institution_ids":["https://openalex.org/I12315562"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20974836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4186","last_page":"4191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8106575608253479},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.711087167263031},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5768837332725525},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5546080470085144},{"id":"https://openalex.org/keywords/zenos-paradoxes","display_name":"Zeno's paradoxes","score":0.54474937915802},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.5250884294509888},{"id":"https://openalex.org/keywords/tcp-friendly-rate-control","display_name":"TCP Friendly Rate Control","score":0.5217586159706116},{"id":"https://openalex.org/keywords/network-congestion","display_name":"Network congestion","score":0.4650510549545288},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4481838047504425},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.42186859250068665},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4091048240661621},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33911019563674927},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12431854009628296},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10111269354820251}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8106575608253479},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711087167263031},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5768837332725525},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5546080470085144},{"id":"https://openalex.org/C7707877","wikidata":"https://www.wikidata.org/wiki/Q33378","display_name":"Zeno's paradoxes","level":2,"score":0.54474937915802},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.5250884294509888},{"id":"https://openalex.org/C30838235","wikidata":"https://www.wikidata.org/wiki/Q7669749","display_name":"TCP Friendly Rate Control","level":4,"score":0.5217586159706116},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.4650510549545288},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4481838047504425},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.42186859250068665},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4091048240661621},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33911019563674927},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12431854009628296},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10111269354820251},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc.2010.5717825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2010.5717825","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"49th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W135750602","https://openalex.org/W645921674","https://openalex.org/W1508882636","https://openalex.org/W1518702348","https://openalex.org/W1572793278","https://openalex.org/W1605678022","https://openalex.org/W1627919342","https://openalex.org/W1860000316","https://openalex.org/W2015244008","https://openalex.org/W2018851823","https://openalex.org/W2035605646","https://openalex.org/W2068864491","https://openalex.org/W2075999172","https://openalex.org/W2096369755","https://openalex.org/W2101267261","https://openalex.org/W2101956251","https://openalex.org/W2103668550","https://openalex.org/W2118115577","https://openalex.org/W2120666720","https://openalex.org/W2120885282","https://openalex.org/W2130565464","https://openalex.org/W2130583399","https://openalex.org/W2160032004","https://openalex.org/W2162193912","https://openalex.org/W2492642174","https://openalex.org/W2994517056","https://openalex.org/W3186624155","https://openalex.org/W3201048512","https://openalex.org/W4213107800","https://openalex.org/W4241645694","https://openalex.org/W6605442156","https://openalex.org/W6630417872","https://openalex.org/W6636440945","https://openalex.org/W6675509860","https://openalex.org/W6677915103"],"related_works":["https://openalex.org/W2361487389","https://openalex.org/W2382744343","https://openalex.org/W2369230276","https://openalex.org/W2070220341","https://openalex.org/W2390377932","https://openalex.org/W2141697444","https://openalex.org/W2357989245","https://openalex.org/W1007877092","https://openalex.org/W2391875810","https://openalex.org/W4389097828"],"abstract_inverted_index":{"The":[0,32,112,193],"security":[1],"of":[2,49,59,108,117,127,135,185,197],"feedback":[3,14,68,99],"control":[4,47,69,151,160,188],"systems":[5,70],"is":[6,172,179,201],"an":[7,39],"important":[8],"problem":[9],"to":[10,66,104,161,181],"the":[11,36,44,67,106,118,125,141,154,168,183],"Internet":[12,22],"because":[13],"controllers":[15],"have":[16],"been":[17],"widely":[18],"used":[19,71],"in":[20,72,148],"popular":[21],"applications":[23],"(e.g.":[24,30],"web":[25,73,102],"server)":[26],"and":[27,46,75,114,153],"fundamental":[28],"protocols":[29],"TCP).":[31],"vulnerability":[33],"comes":[34],"from":[35,90],"fact":[37],"that":[38],"attacker":[40],"can":[41],"easily":[42],"manipulate":[43],"input":[45],"variables":[48],"those":[50,163,198],"controllers.":[51],"In":[52,78],"our":[53],"previous":[54],"works,":[55],"we":[56,86,94,123],"analyzed":[57],"threats":[58],"some":[60],"special":[61],"low-rate":[62],"Denial-of-Service":[63],"attacks":[64,130],"(LRDoS)":[65],"servers":[74,103],"TCP":[76,132,144,157],"flows.":[77],"this":[79],"paper,":[80],"based":[81],"on":[82,131],"hybrid":[83],"system":[84],"theory,":[85],"derive":[87],"general":[88],"results":[89],"two":[91],"aspects.":[92],"First,":[93],"propose":[95],"a":[96],"new":[97],"proportional-integral":[98],"controller":[100,119],"for":[101],"mitigate":[105],"impact":[107,126],"generalized":[109,128],"LRDoS":[110,129],"attacks.":[111],"stability":[113,196],"convergence":[115],"properties":[116],"are":[120],"analyzed.":[121],"Second,":[122],"model":[124,182],"by":[133],"use":[134],"Zeno":[136,174],"control.":[137],"We":[138,165],"investigate":[139],"both":[140],"scenario":[142,155],"when":[143,156,170],"uses":[145,158],"fixed":[146],"parameters":[147],"its":[149],"congestion":[150,187],"algorithm":[152],"adaptive":[159],"adjust":[162],"parameters.":[164],"also":[166],"examine":[167],"case":[169],"there":[171],"no":[173],"solution.":[175],"Limit":[176],"cycle":[177],"analysis":[178],"employed":[180],"behavior":[184],"TCP's":[186],"mechanism":[189],"with":[190],"periodic":[191,199],"solutions.":[192],"globally":[194],"asymptotic":[195],"solutions":[200],"proved.":[202]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
