{"id":"https://openalex.org/W2166187381","doi":"https://doi.org/10.1109/icccn.2005.1523866","title":"Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources","display_name":"Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources","publication_year":2006,"publication_date":"2006-10-11","ids":{"openalex":"https://openalex.org/W2166187381","doi":"https://doi.org/10.1109/icccn.2005.1523866","mag":"2166187381"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2005.1523866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2005.1523866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056051784","display_name":"Ruiliang Chen","orcid":"https://orcid.org/0009-0004-5608-1273"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruiliang Chen","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090830151","display_name":"Jung\u2010Min Park","orcid":"https://orcid.org/0000-0002-4879-8467"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jung-Min Park","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056051784"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":1.5089,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.8552321,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"275","last_page":"280"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8269206285476685},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7724466323852539},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.724402904510498},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7112728357315063},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.6455463767051697},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6195232272148132},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.616602897644043},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.47907954454421997},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.4253954291343689},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.373134970664978},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.15784874558448792},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.13838127255439758}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8269206285476685},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7724466323852539},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.724402904510498},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7112728357315063},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.6455463767051697},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6195232272148132},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.616602897644043},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.47907954454421997},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.4253954291343689},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.373134970664978},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.15784874558448792},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.13838127255439758},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.0},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2005.1523866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2005.1523866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W133650760","https://openalex.org/W206164581","https://openalex.org/W1867219652","https://openalex.org/W1967949770","https://openalex.org/W1987045229","https://openalex.org/W2001968297","https://openalex.org/W2084896955","https://openalex.org/W2118487884","https://openalex.org/W2118878434","https://openalex.org/W2125513999","https://openalex.org/W2133671968","https://openalex.org/W2136090101","https://openalex.org/W2136262545","https://openalex.org/W2154178154","https://openalex.org/W2157413319","https://openalex.org/W4235795579","https://openalex.org/W4254525415","https://openalex.org/W4300930169","https://openalex.org/W6608458714","https://openalex.org/W6642293643","https://openalex.org/W6980946121"],"related_works":["https://openalex.org/W2185727740","https://openalex.org/W2141262251","https://openalex.org/W2137087002","https://openalex.org/W4233532379","https://openalex.org/W2546772914","https://openalex.org/W2529801866","https://openalex.org/W3189446050","https://openalex.org/W2286654277","https://openalex.org/W2162088056","https://openalex.org/W3215145745"],"abstract_inverted_index":{"Attack":[0],"mitigation":[1,22,56],"schemes":[2,260],"actively":[3],"throttle":[4],"attack":[5,16,21,41,46,55,62,78,139,143,160,202,223,238],"traffic":[6,140,195,231],"generated":[7,196],"in":[8,44,129,188],"distributed":[9],"denial-of-service":[10],"(DDoS)":[11],"attacks.":[12,210],"This":[13],"paper":[14],"presents":[15],"diagnosis":[17,224],"(AD),":[18],"a":[19,66,73,198,234,249],"novel":[20],"scheme":[23],"that":[24,69,118,120,154,226],"combines":[25],"the":[26,38,51,61,99,109,112,115,124,130,133,138,142,146,150,164,173,177,255],"concepts":[27],"of":[28,96,114,176,201,229,237],"Pushback":[29],"and":[30,54,242,246,269],"packet":[31,106,131],"marking.":[32],"AD's":[33],"architecture":[34],"is":[35,48,57,65,70,148,205,227],"inline":[36],"with":[37,111],"ideal":[39],"DDoS":[40],"countermeasure":[42],"paradigm,":[43],"which":[45],"detection":[47],"performed":[49],"near":[50],"victim":[52,74,83,110,134,151],"host":[53,75],"executed":[58],"close":[59,162],"to":[60,90,141,158,163,219,263],"sources.":[63,144],"AD":[64,85,167,191,220,241],"reactive":[67],"defense":[68],"activated":[71],"by":[72,86,172,197],"after":[76],"an":[77,217],"has":[79],"been":[80],"detected.":[81],"A":[82],"activates":[84],"sending":[87],"AD-related":[88],"commands":[89,168],"its":[91],"upstream":[92,101],"routers.":[93],"On":[94],"receipt":[95],"such":[97],"commands,":[98],"AD-enabled":[100,156],"routers":[102,157],"deterministically":[103],"mark":[104],"each":[105],"destined":[107],"for":[108],"information":[113,127],"input":[116],"interface":[117,126],"processed":[119],"packet.":[121],"By":[122],"collecting":[123],"router":[125],"recorded":[128],"markings,":[132],"can":[135,169,192],"trace":[136],"back":[137],"Once":[145],"traceback":[147],"complete,":[149],"issues":[152],"messages":[153],"command":[155],"filter":[159,194],"packets":[161],"source.":[165],"The":[166],"be":[170,264],"authenticated":[171],"TTL":[174],"field":[175],"IP":[178,267],"header":[179],"without":[180],"relying":[181],"on":[182,254],"any":[183],"global":[184],"key":[185],"distribution":[186],"infrastructure":[187],"Internet.":[189],"Although":[190],"effectively":[193],"moderate":[199],"number":[200,236],"sources,":[203],"it":[204],"not":[206],"effective":[207],"against":[208,266],"large-scale":[209],"To":[211],"address":[212],"this":[213],"problem,":[214],"we":[215],"propose":[216],"extension":[218],"called":[221],"parallel":[222],"(PAD)":[225],"capable":[228],"throttling":[230],"coming":[232],"from":[233],"large":[235],"sources":[239],"simultaneously.":[240],"PAD":[243],"are":[244,261],"analyzed":[245],"evaluated":[247],"using":[248],"realistic":[250],"network":[251],"topology":[252],"based":[253],"Skitter":[256],"Internet":[257],"map.":[258],"Both":[259],"shown":[262],"robust":[265],"spoofing":[268],"incur":[270],"low":[271],"false":[272],"positive":[273],"ratios.":[274]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
