{"id":"https://openalex.org/W2156136808","doi":"https://doi.org/10.1109/dsn.2004.1311892","title":"Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast","display_name":"Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2156136808","doi":"https://doi.org/10.1109/dsn.2004.1311892","mag":"2156136808"},"language":"en","primary_location":{"id":"doi:10.1109/dsn.2004.1311892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2004.1311892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conference on Dependable Systems and Networks, 2004","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031319202","display_name":"Gal Badishi","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"G. Badishi","raw_affiliation_strings":["EE Department, Technion-Israel Institute of Technology, Israel"],"affiliations":[{"raw_affiliation_string":"EE Department, Technion-Israel Institute of Technology, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059238786","display_name":"Idit Keidar","orcid":"https://orcid.org/0000-0002-6417-1250"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"I. Keidar","raw_affiliation_strings":["EE Department, Technion-Israel Institute of Technology, Israel"],"affiliations":[{"raw_affiliation_string":"EE Department, Technion-Israel Institute of Technology, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081355533","display_name":"Amir Sasson","orcid":"https://orcid.org/0000-0003-4291-5447"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"A. Sasson","raw_affiliation_strings":["CS Department, Technion-Israel Institute of Technology, Israel"],"affiliations":[{"raw_affiliation_string":"CS Department, Technion-Israel Institute of Technology, Israel","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5031319202"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":4.4032,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.95078226,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"223","last_page":"232"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.8806187510490417},{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.8314354419708252},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8264646530151367},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8212119340896606},{"id":"https://openalex.org/keywords/gossip-protocol","display_name":"Gossip protocol","score":0.7172223329544067},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6331468820571899},{"id":"https://openalex.org/keywords/reliable-multicast","display_name":"Reliable multicast","score":0.6128299832344055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.556100606918335},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48988574743270874},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4430115818977356},{"id":"https://openalex.org/keywords/protocol-independent-multicast","display_name":"Protocol Independent Multicast","score":0.2761490046977997},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.19475650787353516},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12938207387924194}],"concepts":[{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.8806187510490417},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.8314354419708252},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8264646530151367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8212119340896606},{"id":"https://openalex.org/C145928361","wikidata":"https://www.wikidata.org/wiki/Q5587504","display_name":"Gossip protocol","level":3,"score":0.7172223329544067},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6331468820571899},{"id":"https://openalex.org/C174174714","wikidata":"https://www.wikidata.org/wiki/Q7310997","display_name":"Reliable multicast","level":4,"score":0.6128299832344055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.556100606918335},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48988574743270874},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4430115818977356},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.2761490046977997},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.19475650787353516},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12938207387924194},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsn.2004.1311892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2004.1311892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conference on Dependable Systems and Networks, 2004","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1498585374","https://openalex.org/W1551587457","https://openalex.org/W1560512596","https://openalex.org/W1563061804","https://openalex.org/W1602845237","https://openalex.org/W1609618519","https://openalex.org/W1970705443","https://openalex.org/W1984977694","https://openalex.org/W1985006281","https://openalex.org/W2019616576","https://openalex.org/W2038562061","https://openalex.org/W2053451652","https://openalex.org/W2072738703","https://openalex.org/W2084896955","https://openalex.org/W2086449672","https://openalex.org/W2087966294","https://openalex.org/W2095202767","https://openalex.org/W2112603289","https://openalex.org/W2138547999","https://openalex.org/W2145185087","https://openalex.org/W2150622918","https://openalex.org/W2152135680","https://openalex.org/W2155599998","https://openalex.org/W2157004711","https://openalex.org/W2157131949","https://openalex.org/W2158007802","https://openalex.org/W2159305587","https://openalex.org/W2166755212","https://openalex.org/W2290132939","https://openalex.org/W2296427920","https://openalex.org/W2466575204","https://openalex.org/W4246404160","https://openalex.org/W6632750658","https://openalex.org/W6633671634","https://openalex.org/W6636183821","https://openalex.org/W6653881635"],"related_works":["https://openalex.org/W3024820515","https://openalex.org/W1507171077","https://openalex.org/W2131433923","https://openalex.org/W2010318438","https://openalex.org/W2020760577","https://openalex.org/W1678654634","https://openalex.org/W2149172033","https://openalex.org/W2120550887","https://openalex.org/W2108737453","https://openalex.org/W2145574556"],"abstract_inverted_index":{"We":[0,20,35,58,82],"propose":[1,59],"a":[2,17,22,62,79],"framework":[3],"and":[4,40,76,89],"methodology":[5],"for":[6],"quantifying":[7],"the":[8,26],"effect":[9],"of":[10,12,25,28,48],"denial":[11],"service":[13],"(DoS)":[14],"attacks":[15],"on":[16,78],"distributed":[18,39],"system.":[19],"present":[21],"systematic":[23],"study":[24],"resistance":[27],"gossip-based":[29,42,64],"multicast":[30,65],"protocols":[31],"to":[32,55],"DoS":[33,56,96],"attacks.":[34,57,97],"show":[36],"that":[37,67,92],"even":[38],"randomized":[41],"protocols,":[43],"which":[44],"eliminate":[45,53],"single":[46],"points":[47],"failure,":[49],"do":[50],"not":[51],"necessarily":[52],"vulnerabilities":[54],"Drum":[60,71,93],"-":[61],"simple":[63],"protocol":[66],"eliminates":[68],"such":[69],"vulnerabilities.":[70],"was":[72],"implemented":[73],"in":[74],"Java":[75],"tested":[77],"large":[80],"cluster.":[81],"show,":[83],"using":[84],"closed-form":[85],"mathematical":[86],"analysis,":[87],"simulations,":[88],"empirical":[90],"tests,":[91],"survives":[94],"severe":[95]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
