{"id":"https://openalex.org/W2902623174","doi":"https://doi.org/10.1109/icacci.2018.8554408","title":"A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model","display_name":"A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2902623174","doi":"https://doi.org/10.1109/icacci.2018.8554408","mag":"2902623174"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554408","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019764909","display_name":"Neha Pimpalkar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Neha Pimpalkar","raw_affiliation_strings":["Department of Computer Engineering, IT College of Engineering Pune, Pune"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, IT College of Engineering Pune, Pune","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015953739","display_name":"Jibi Abraham","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jibi Abraham","raw_affiliation_strings":["Department of Computer Engineering, IT College of Engineering Pune, Pune"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, IT College of Engineering Pune, Pune","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019764909"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7854,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81609522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"419","last_page":"424"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8699100613594055},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.8166658282279968},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8019808530807495},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.7346517443656921},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7161089181900024},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5944877862930298},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.554921567440033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5263974666595459},{"id":"https://openalex.org/keywords/cloud-service-provider","display_name":"Cloud service provider","score":0.514407217502594},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48588651418685913},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.4783762991428375},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3612516522407532},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.33422350883483887}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8699100613594055},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.8166658282279968},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8019808530807495},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.7346517443656921},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7161089181900024},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5944877862930298},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.554921567440033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5263974666595459},{"id":"https://openalex.org/C2983819522","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud service provider","level":4,"score":0.514407217502594},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48588651418685913},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.4783762991428375},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3612516522407532},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.33422350883483887}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554408","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W104805067","https://openalex.org/W1427174644","https://openalex.org/W1467126665","https://openalex.org/W1503814339","https://openalex.org/W1555558540","https://openalex.org/W1934458198","https://openalex.org/W1992291252","https://openalex.org/W2043487371","https://openalex.org/W2119028650","https://openalex.org/W2165666960","https://openalex.org/W2171863291","https://openalex.org/W2255548496","https://openalex.org/W2337480911","https://openalex.org/W2502012562","https://openalex.org/W2522718524","https://openalex.org/W2565526159","https://openalex.org/W2755364709","https://openalex.org/W2891263450","https://openalex.org/W2952203331","https://openalex.org/W6628261430"],"related_works":["https://openalex.org/W3083135738","https://openalex.org/W2005435933","https://openalex.org/W2188430254","https://openalex.org/W2747005099","https://openalex.org/W2179519055","https://openalex.org/W2549930939","https://openalex.org/W2145292010","https://openalex.org/W1973516247","https://openalex.org/W1775827617","https://openalex.org/W1991063492"],"abstract_inverted_index":{"Businesses":[0],"have":[1],"observed":[2,120],"a":[3,63,131],"paradigm":[4],"shift":[5],"from":[6,82],"traditional":[7],"computing":[8],"models":[9],"to":[10,31,46,56,66,106,133],"\u201cpay":[11],"as":[12,37,99],"you":[13],"use\u201d":[14],"Cloud":[15,19],"Computing":[16],"model.":[17],"Major":[18],"Service":[20,145],"Providers(CSPs)":[21],"like":[22],"Amazon":[23],"AWS":[24],"and":[25,116,151,173,195],"Microsoft":[26],"Azure":[27],"use":[28],"virtualization":[29],"technologies":[30],"provide":[32],"users":[33],"with":[34],"Virtual":[35],"Machines(VM)":[36],"they":[38],"require":[39],"for":[40],"the":[41,52,67,76,134,143,158,161,166,180,189,200],"computations.":[42],"Many":[43],"VMs":[44],"unknown":[45],"each":[47],"other":[48],"are":[49,119],"colocated":[50],"on":[51,185],"same":[53],"physical":[54],"machine":[55],"maximize":[57],"resource":[58],"utilization.":[59],"However,":[60],"this":[61,91],"poses":[62],"serious":[64],"threat":[65,132],"security":[68],"of":[69,78,88,125,160],"cloud":[70,135,144,190],"users.":[71],"Recent":[72],"research":[73],"has":[74],"shown":[75],"evidence":[77],"reconstructing":[79],"secret":[80],"keys":[81],"co-located":[83],"target":[84],"VM":[85,202],"via":[86],"creation":[87],"side-channels.":[89],"In":[90],"paper,":[92],"an":[93],"LLC":[94],"DoS":[95],"attack":[96,128,139],"technique":[97],"named":[98],"Continuous":[100],"Flush":[101],"is":[102,177,183],"presented":[103],"which":[104,121,154,203],"aims":[105],"degrade":[107],"processor":[108],"performance.":[109],"A":[110,168],"significant":[111],"increase":[112],"in":[113,123,163,188],"CPU":[114],"cycles":[115],"cache":[117,186],"misses":[118],"results":[122],"under-utilization":[124],"CPU.":[126],"This":[127],"can":[129],"be":[130,205],"infrastructure.":[136],"Moreover,":[137],"such":[138],"may":[140,155],"also":[141],"violate":[142],"Level":[146],"Agreement(SLA)":[147],"present":[148],"between":[149],"CSPs":[150,162],"its":[152],"customers":[153],"further":[156],"affect":[157],"reputation":[159],"turn":[164],"affecting":[165],"businesses.":[167],"generalized":[169],"Hypervisor-based":[170],"Intrusion":[171],"Detection":[172],"Prevention":[174],"System":[175],"model":[176,182,197],"proposed":[178],"wherein":[179],"detection":[181],"focusing":[184],"attacks":[187],"environment":[191],"combining":[192],"several":[193],"strategies":[194],"prevention":[196],"will":[198,204],"isolate":[199],"malicious":[201],"charged":[206],"significantly":[207],"higher":[208],"by":[209],"CSP.":[210]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
