{"id":"https://openalex.org/W2782841157","doi":"https://doi.org/10.1109/glocom.2017.8254004","title":"Scalable Bandwidth Allocation Based on Domain Attributes: Towards a DDoS-Resistant Data Center","display_name":"Scalable Bandwidth Allocation Based on Domain Attributes: Towards a DDoS-Resistant Data Center","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2782841157","doi":"https://doi.org/10.1109/glocom.2017.8254004","mag":"2782841157"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2017.8254004","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100446933","display_name":"Yao Zhang","orcid":"https://orcid.org/0000-0001-5371-2392"},"institutions":[{"id":"https://openalex.org/I4210144143","display_name":"Inspur (China)","ror":"https://ror.org/0474p4r72","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210144143"]},{"id":"https://openalex.org/I4210108204","display_name":"China Electronic Information Industry Development","ror":"https://ror.org/01mbbxx50","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210108204","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yao Zhang","raw_affiliation_strings":["Inspur Electronic Information Industry Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inspur Electronic Information Industry Co., Ltd, Beijing, China","institution_ids":["https://openalex.org/I4210108204","https://openalex.org/I4210144143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101638016","display_name":"Lijia Xie","orcid":"https://orcid.org/0000-0002-4920-232X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lijia Xie","raw_affiliation_strings":["LMIB, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"LMIB, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100366083","display_name":"Dong Zhang","orcid":"https://orcid.org/0000-0001-9523-3592"},"institutions":[{"id":"https://openalex.org/I4210144143","display_name":"Inspur (China)","ror":"https://ror.org/0474p4r72","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210144143"]},{"id":"https://openalex.org/I4210108204","display_name":"China Electronic Information Industry Development","ror":"https://ror.org/01mbbxx50","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210108204","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zhang","raw_affiliation_strings":["Inspur Electronic Information Industry Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inspur Electronic Information Industry Co., Ltd, Beijing, China","institution_ids":["https://openalex.org/I4210108204","https://openalex.org/I4210144143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100412393","display_name":"Gang Liu","orcid":"https://orcid.org/0000-0001-7365-3166"},"institutions":[{"id":"https://openalex.org/I4210144143","display_name":"Inspur (China)","ror":"https://ror.org/0474p4r72","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210144143"]},{"id":"https://openalex.org/I4210108204","display_name":"China Electronic Information Industry Development","ror":"https://ror.org/01mbbxx50","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210108204","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Liu","raw_affiliation_strings":["Inspur Electronic Information Industry Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Inspur Electronic Information Industry Co., Ltd, Beijing, China","institution_ids":["https://openalex.org/I4210108204","https://openalex.org/I4210144143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341330","display_name":"Qi Wang","orcid":"https://orcid.org/0000-0002-7764-9858"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qi Wang","raw_affiliation_strings":["School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom","institution_ids":["https://openalex.org/I43439940"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100446933"],"corresponding_institution_ids":["https://openalex.org/I4210108204","https://openalex.org/I4210144143"],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59811056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8137583136558533},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6977310180664062},{"id":"https://openalex.org/keywords/data-center","display_name":"Data center","score":0.5910424590110779},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5834571719169617},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5671335458755493},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5661640167236328},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.48810824751853943},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4763617515563965},{"id":"https://openalex.org/keywords/bandwidth-allocation","display_name":"Bandwidth allocation","score":0.43004870414733887},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.400770902633667},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.39395731687545776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3350416421890259},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11696898937225342}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8137583136558533},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6977310180664062},{"id":"https://openalex.org/C153740404","wikidata":"https://www.wikidata.org/wiki/Q671224","display_name":"Data center","level":2,"score":0.5910424590110779},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5834571719169617},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5671335458755493},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5661640167236328},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.48810824751853943},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4763617515563965},{"id":"https://openalex.org/C200157131","wikidata":"https://www.wikidata.org/wiki/Q4854763","display_name":"Bandwidth allocation","level":3,"score":0.43004870414733887},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.400770902633667},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.39395731687545776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3350416421890259},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11696898937225342},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/glocom.2017.8254004","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.soton.ac.uk:420853","is_oa":false,"landing_page_url":"https://eprints.soton.ac.uk/420853/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1620365745","https://openalex.org/W1973778182","https://openalex.org/W2030650827","https://openalex.org/W2055241621","https://openalex.org/W2083793737","https://openalex.org/W2098335897","https://openalex.org/W2116062114","https://openalex.org/W2118878434","https://openalex.org/W2129909248","https://openalex.org/W2144256483","https://openalex.org/W2145721479","https://openalex.org/W2207058899","https://openalex.org/W2418312935","https://openalex.org/W2555225904","https://openalex.org/W3100936663","https://openalex.org/W3138887713","https://openalex.org/W4205212999","https://openalex.org/W4234335113","https://openalex.org/W4302094287"],"related_works":["https://openalex.org/W2055187606","https://openalex.org/W1498304890","https://openalex.org/W1969542292","https://openalex.org/W4214914670","https://openalex.org/W2084875360","https://openalex.org/W3006216828","https://openalex.org/W3123077549","https://openalex.org/W2904165227","https://openalex.org/W2770088598","https://openalex.org/W70469698"],"abstract_inverted_index":{"As":[0],"the":[1,15,97,142],"flourishing":[2],"of":[3,17,20,99,105,144],"cloud":[4],"services,":[5],"data":[6,30,88,118,138],"centers":[7],"are":[8],"widely":[9],"invested":[10],"and":[11,116,131,151],"deployed.":[12],"However,":[13],"facing":[14],"hazard":[16],"Distributed":[18],"Denial":[19],"Service":[21],"(DDoS)":[22],"attacks,":[23],"legitimate":[24],"users'":[25],"bandwidth":[26,111],"access":[27,120],"to":[28,56,75],"a":[29,35,43,53,65,86],"center":[31,89,119],"is":[32,71,125],"not":[33],"yet":[34],"guarantee.":[36],"In":[37],"response,":[38],"capability-based":[39,87],"DDoS":[40],"defenses":[41],"provide":[42,76],"promising":[44],"countermeasure,":[45],"especially":[46],"when":[47],"leveraging":[48],"Autonomous":[49],"System":[50],"(AS)":[51],"as":[52],"geographic":[54],"constraint":[55],"throttle":[57],"attacking":[58],"flows.":[59],"Unfortunately,":[60],"previous":[61],"schemes":[62],"essentially":[63],"involve":[64],"source-AS":[66],"fair":[67,110],"sharing":[68],"strategy,":[69],"which":[70],"too":[72],"coarse-":[73],"grained":[74],"fairness":[77],"among":[78,113],"heterogeneous":[79],"AS":[80],"entities.":[81],"This":[82],"paper":[83],"proposes":[84],"D4,":[85],"protection":[90],"with":[91,127,154],"state-defined":[92],"allocating":[93],"granularity.":[94],"We":[95,140],"differentiate":[96],"states":[98],"stub":[100],"ASes":[101],"through":[102],"diverse":[103],"aspects":[104],"domain":[106],"attributes.":[107],"D4":[108,145],"enables":[109],"allocation":[112],"source":[114],"domains":[115],"scalable":[117],"for":[121],"users.":[122],"Our":[123],"scheme":[124],"integrated":[126],"Border":[128],"Gateway":[129],"Protocol":[130],"can":[132],"be":[133],"practically":[134],"deployed":[135],"by":[136],"Internet":[137],"centers.":[139],"illustrate":[141],"effectiveness":[143],"via":[146],"experiments":[147],"under":[148],"different":[149],"scenarios":[150],"comparative":[152],"simulations":[153],"closely":[155],"related":[156],"schemes.":[157]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
