{"id":"https://openalex.org/W2160205926","doi":"https://doi.org/10.1109/icccn.2005.1523865","title":"On the impact of DoS attacks on internet traffic characteristics and QoS","display_name":"On the impact of DoS attacks on internet traffic characteristics and QoS","publication_year":2006,"publication_date":"2006-10-11","ids":{"openalex":"https://openalex.org/W2160205926","doi":"https://doi.org/10.1109/icccn.2005.1523865","mag":"2160205926"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2005.1523865","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2005.1523865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091296528","display_name":"Philippe Owezarski","orcid":"https://orcid.org/0000-0001-7713-7003"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I190497903","display_name":"Laboratoire d'Analyse et d'Architecture des Syst\u00e8mes","ror":"https://ror.org/03vcm6439","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I134560555","https://openalex.org/I190497903","https://openalex.org/I196454796","https://openalex.org/I205747304","https://openalex.org/I205747304","https://openalex.org/I4210095849","https://openalex.org/I4210159245","https://openalex.org/I4387153255","https://openalex.org/I4405258862","https://openalex.org/I4405258862","https://openalex.org/I4405258862","https://openalex.org/I4405258862"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"P. Owezarski","raw_affiliation_strings":["LAAS, CNRS, France"],"affiliations":[{"raw_affiliation_string":"LAAS, CNRS, France","institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I190497903"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091296528"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I190497903"],"apc_list":null,"apc_paid":null,"fwci":3.3196,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.93046595,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"269","last_page":"274"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7980867028236389},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7290012240409851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7164553999900818},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.654933512210846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6291624307632446},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6124106049537659},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.5615994334220886},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.4847923815250397},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42528820037841797},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09074246883392334}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7980867028236389},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7290012240409851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7164553999900818},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.654933512210846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6291624307632446},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6124106049537659},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.5615994334220886},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.4847923815250397},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42528820037841797},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09074246883392334}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2005.1523865","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2005.1523865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1499963479","https://openalex.org/W1524450435","https://openalex.org/W1576539718","https://openalex.org/W1671522217","https://openalex.org/W1996623555","https://openalex.org/W2085027889","https://openalex.org/W2101453614","https://openalex.org/W2102616700","https://openalex.org/W2105818147","https://openalex.org/W2117495845","https://openalex.org/W2128796442","https://openalex.org/W2133107013","https://openalex.org/W2142858316","https://openalex.org/W2146320425","https://openalex.org/W2150228605","https://openalex.org/W2152444960","https://openalex.org/W2157366001","https://openalex.org/W2159048618","https://openalex.org/W2159160833","https://openalex.org/W2168761028","https://openalex.org/W4236369288","https://openalex.org/W6681669679","https://openalex.org/W6682144364","https://openalex.org/W6683238159"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2893779165","https://openalex.org/W2501669162"],"abstract_inverted_index":{"The":[0,157],"Internet":[1,197],"is":[2,71,88,200,217],"on":[3,169,207],"the":[4,8,43,59,62,75,79,99,108,152,170,174,188,191,204],"way":[5],"of":[6,25,28,61,110,113,159,176,195],"becoming":[7],"universal":[9],"communication":[10],"network,":[11,69],"and":[12,90,122,213],"then":[13,33],"needs":[14],"to":[15,57,64,73,128],"provide":[16],"various":[17],"services":[18],"with":[19,49,85],"guaranteed":[20,38],"quality":[21,109],"for":[22,150,222],"all":[23],"kinds":[24],"applications.":[26],"Denial":[27],"service":[29,111],"(DoS)":[30],"attacks":[31,125,161,177],"are":[32,119,181],"more":[34],"efficient":[35],"in":[36,42,187,203],"a":[37,53,67,104,114,219],"multi-services":[39,68],"network":[40,76,115,153],"than":[41],"\"old\"":[44],"best":[45,50],"effort":[46,51],"Internet.":[47,171],"Indeed,":[48],"services,":[52],"DoS":[54,105,124,160],"attack":[55,63,106],"has":[56,162],"forbid":[58],"target":[60],"communicate.":[65],"With":[66],"it":[70,147],"sufficient":[72],"make":[74],"not":[77],"respect":[78],"SLA":[80],"(service":[81],"level":[82],"agreement)":[83],"committed":[84],"clients,":[86],"what":[87],"easier":[89],"can":[91,148],"be":[92],"performed":[93,164],"using":[94,165],"simple":[95],"flooding":[96],"attacks.":[97,156],"Then,":[98],"question":[100,141],"is:":[101],"how":[102],"does":[103],"impact":[107],"(QoS)":[112],"given":[116],"that":[117,123,146,179],"networks":[118],"hugely":[120],"over-provisioned,":[121],"never":[126],"succeed":[127],"completely":[129],"overflow":[130],"these":[131],"high":[132],"speed":[133],"networks?":[134],"This":[135],"paper":[136],"aims":[137],"at":[138],"answering":[139],"this":[140],"as":[142],"we":[143],"do":[144],"believe":[145],"help":[149],"defending":[151],"against":[154],"such":[155,218],"analysis":[158,175,214],"been":[163],"traffic":[166,210],"monitoring":[167],"tools":[168],"In":[172],"particular,":[173],"shows":[178],"they":[180],"increasing":[182],"long":[183],"range":[184],"dependence":[185],"(LRD)":[186],"traffic,":[189],"breaking":[190],"invariant":[192],"power":[193],"laws":[194],"normal":[196,209],"traffic.":[198],"It":[199],"also":[201],"explained":[202],"paper,":[205],"based":[206],"some":[208],"traces":[211],"characterization":[212],"why":[215],"LRD":[216],"bad":[220],"parameter":[221],"having":[223],"good":[224],"QoS.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
