{"id":"https://openalex.org/W2066376969","doi":"https://doi.org/10.1109/glocomw.2014.7063387","title":"Web bugs in the cloud: Feasibility study of a new form of EDoS attack","display_name":"Web bugs in the cloud: Feasibility study of a new form of EDoS attack","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2066376969","doi":"https://doi.org/10.1109/glocomw.2014.7063387","mag":"2066376969"},"language":"en","primary_location":{"id":"doi:10.1109/glocomw.2014.7063387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2014.7063387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052078550","display_name":"Natalia Vlajic","orcid":null},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Natalia Vlajic","raw_affiliation_strings":["Dept. of Electrical Engineering & Computer Science, York University, Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical Engineering & Computer Science, York University, Toronto, Canada","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032547218","display_name":"Armin Slopek","orcid":null},"institutions":[{"id":"https://openalex.org/I155417937","display_name":"Hochschule Bonn-Rhein-Sieg","ror":"https://ror.org/04m2anh63","country_code":"DE","type":"education","lineage":["https://openalex.org/I155417937"]},{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA","DE"],"is_corresponding":false,"raw_author_name":"Armin Slopek","raw_affiliation_strings":["Department of Computer Science, Hochschule Bonn-Rhein-Sieg, St. Augustin, Germany","Dept. of Electrical Engineering & Computer Science, York University, Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hochschule Bonn-Rhein-Sieg, St. Augustin, Germany","institution_ids":["https://openalex.org/I155417937"]},{"raw_affiliation_string":"Dept. of Electrical Engineering & Computer Science, York University, Toronto, Canada","institution_ids":["https://openalex.org/I192455969"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052078550"],"corresponding_institution_ids":["https://openalex.org/I192455969"],"apc_list":null,"apc_paid":null,"fwci":1.7241,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86546118,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9092934131622314},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7432436943054199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7104199528694153},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.6811072826385498},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6635493040084839},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6304500699043274},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.533359706401825},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4565839171409607},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28184571862220764},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26203516125679016}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9092934131622314},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7432436943054199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7104199528694153},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.6811072826385498},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6635493040084839},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6304500699043274},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.533359706401825},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4565839171409607},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28184571862220764},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26203516125679016},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocomw.2014.7063387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2014.7063387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1534832567","https://openalex.org/W2012185189","https://openalex.org/W2012354735","https://openalex.org/W2026864625","https://openalex.org/W2034120733","https://openalex.org/W2048342057","https://openalex.org/W2054321243","https://openalex.org/W2134385885","https://openalex.org/W2159764755","https://openalex.org/W4285719527","https://openalex.org/W6632151213"],"related_works":["https://openalex.org/W4230824443","https://openalex.org/W2292210693","https://openalex.org/W2038807247","https://openalex.org/W2097156747","https://openalex.org/W2559738661","https://openalex.org/W4386384589","https://openalex.org/W2514488323","https://openalex.org/W4312347107","https://openalex.org/W4321609369","https://openalex.org/W2140607115"],"abstract_inverted_index":{"Economic":[0],"Denial":[1],"of":[2,9,19,37,55,63,72,94,99,112,125,136,209,222],"Sustainability":[3],"(EDoS)":[4],"is":[5,22,52,194,214],"a":[6,25,56,59,91,105,145,195,201,230],"new":[7],"form":[8],"security":[10],"attack":[11,21,51,108,150,198,204],"specifically":[12],"targeting":[13],"Cloud-hosted":[14],"websites/domains.":[15],"The":[16,43,110],"main":[17],"goal":[18,111],"EDoS":[20,50,141,191],"to":[23,47,87,120,132,144,156,166,169,218,229],"impose":[24],"significant":[26],"financial":[27],"burden":[28],"on":[29,185],"the":[30,38,68,83,122,134,161,170,207,215,220],"victim":[31],"through":[32],"skillful":[33],"and":[34,158,178,225,227],"measured":[35],"consumption":[36],"victim's":[39],"metered":[40],"(pay-as-you-go)":[41],"bandwidth.":[42],"most":[44],"straightforward":[45],"way":[46],"conduct":[48],"an":[49,140,149,179],"by":[53],"means":[54],"custom-built":[57],"or":[58],"rented":[60],"botnet":[61,85],"capable":[62],"executing":[64],"application-layer":[65],"DDoS.":[66],"However,":[67],"common":[69],"known":[70],"disadvantages":[71],"botnet-based":[73,146],"EDoS/DDoS":[74],"attacks":[75],"are:":[76],"a)":[77],"high":[78,97],"cost":[79,168],"in":[80,104,116,130,139],"cases":[81],"when":[82],"(rented)":[84],"needs":[86],"be":[88,152],"used":[89],"over":[90],"prolonged":[92],"interval":[93],"time,":[95],"b)":[96],"chance":[98],"bot-blacklisting":[100],"that":[101,190],"could":[102],"result":[103],"significantly":[106],"diminished":[107],"potential.":[109,205],"our":[113,210],"work":[114],"presented":[115],"this":[117,212],"paper":[118],"was":[119],"investigate":[121],"technical":[123],"feasibility":[124],"using":[126,192],"spam-email":[127,177],"with":[128,200],"Web-bugs":[129,193,224],"order":[131],"engage":[133],"browsers":[135],"legitimate":[137],"users":[138],"attack.":[142],"Compared":[143],"EDoS,":[147,223],"such":[148],"would":[151],"far":[153],"more":[154],"difficult":[155],"detect":[157],"thwart":[159],"for":[160],"victim,":[162],"while":[163],"imposing":[164],"minimal":[165],"no":[167],"attacker.":[171],"Our":[172],"preliminary":[173],"results,":[174],"involving":[175],"real-world":[176],"actual":[180],"`victim'":[181],"site":[182],"set":[183],"up":[184],"Amazon":[186],"S3":[187],"Cloud,":[188],"show":[189],"technically":[196],"feasible":[197],"option":[199],"reasonably":[202],"sufficient":[203],"To":[206],"best":[208],"knowledge,":[211],"study":[213],"first":[216],"one":[217],"combine":[219],"topics/concepts":[221],"spam-email,":[226],"point":[228],"potentially":[231],"problematic":[232],"interplay":[233],"among":[234],"them.":[235]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
