{"id":"https://openalex.org/W4404029957","doi":"https://doi.org/10.1109/icccnt61001.2024.10725175","title":"Survey of Vulnerabilities and Architectural Flaws in Existing Collaborative DDoS Mitigation Systems for Autonomous Systems","display_name":"Survey of Vulnerabilities and Architectural Flaws in Existing Collaborative DDoS Mitigation Systems for Autonomous Systems","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404029957","doi":"https://doi.org/10.1109/icccnt61001.2024.10725175"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10725175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10725175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049013080","display_name":"Shikha Garg","orcid":"https://orcid.org/0000-0002-9345-6669"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shikha Garg","raw_affiliation_strings":["Punjabi University,Dept. of ECE,Patiala,India"],"affiliations":[{"raw_affiliation_string":"Punjabi University,Dept. of ECE,Patiala,India","institution_ids":["https://openalex.org/I79161377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079072247","display_name":"Sonia Goyal","orcid":null},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sonia Goyal","raw_affiliation_strings":["Punjabi University,Dept. of ECE,Patiala,India"],"affiliations":[{"raw_affiliation_string":"Punjabi University,Dept. of ECE,Patiala,India","institution_ids":["https://openalex.org/I79161377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050836902","display_name":"Abhinav Bhandari","orcid":"https://orcid.org/0000-0002-2398-9144"},"institutions":[{"id":"https://openalex.org/I79161377","display_name":"Punjabi University","ror":"https://ror.org/00xdn8y92","country_code":"IN","type":"education","lineage":["https://openalex.org/I79161377"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Abhinav Bhandari","raw_affiliation_strings":["Punjabi University,Dept. of CSE,Patiala,India"],"affiliations":[{"raw_affiliation_string":"Punjabi University,Dept. of CSE,Patiala,India","institution_ids":["https://openalex.org/I79161377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049013080"],"corresponding_institution_ids":["https://openalex.org/I79161377"],"apc_list":null,"apc_paid":null,"fwci":1.0958,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79882633,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7115646004676819},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6323950290679932},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4772098660469055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45344382524490356},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.424642413854599},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.127513587474823},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09251636266708374}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7115646004676819},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6323950290679932},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4772098660469055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45344382524490356},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.424642413854599},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.127513587474823},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09251636266708374}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10725175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10725175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2049460486","https://openalex.org/W2065283652","https://openalex.org/W2072426395","https://openalex.org/W2115974339","https://openalex.org/W2151346776","https://openalex.org/W2290950890","https://openalex.org/W2293963787","https://openalex.org/W2318191508","https://openalex.org/W2474414835","https://openalex.org/W2624744148","https://openalex.org/W2756294556","https://openalex.org/W2791066471","https://openalex.org/W2801821102","https://openalex.org/W2810903447","https://openalex.org/W2897608905","https://openalex.org/W2938202383","https://openalex.org/W2963129815","https://openalex.org/W3006271200","https://openalex.org/W3017134229","https://openalex.org/W3049107452","https://openalex.org/W3126468572","https://openalex.org/W4253708916","https://openalex.org/W4280498786","https://openalex.org/W4394610696","https://openalex.org/W6747904516","https://openalex.org/W6866029348"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2185673024","https://openalex.org/W4377970398","https://openalex.org/W3026018975"],"abstract_inverted_index":{"In":[0],"the":[1,45,57,74,79,82,92,98,102,110,116,136,141,147,162],"era":[2],"of":[3,48,59,109,149,166],"modern":[4],"internet":[5],"infrastructure,":[6],"DDoS":[7,50,61,157],"attacks":[8,22],"create":[9],"a":[10,25,106],"severe":[11],"threat":[12],"to":[13,19,112,121,144],"cyberspace.":[14],"So,":[15],"it":[16],"is":[17],"essential":[18],"mitigate":[20],"these":[21],"by":[23,55],"strategizing":[24],"collaborative":[26,156],"defense":[27],"mechanism":[28],"that":[29],"combines":[30],"resources":[31],"collected":[32],"from":[33,96],"various":[34],"sources":[35],"like":[36],"ASes,":[37],"ISPs,":[38],"and":[39,70,76,88,100,114,118,124,131,138,164],"CDNs.":[40],"This":[41],"paper":[42,80,103,142],"focuses":[43],"on":[44,73],"security":[46],"aspects":[47],"Collaborative":[49,60],"Mitigation":[51,62],"Systems.":[52],"We":[53],"begin":[54],"discussing":[56,97],"components":[58,99],"Systems":[63],"for":[64,127,160],"AS":[65],"in":[66,91],"two":[67],"ways:":[68],"Centralized":[69],"Decentralized.":[71],"Based":[72],"centralized":[75],"decentralized":[77],"approaches,":[78],"discusses":[81],"Vulnerable":[83],"points":[84,87],"or":[85],"attack":[86],"architectural":[89],"flaws":[90,119],"existing":[93],"frameworks.":[94],"Apart":[95],"vulnerabilities,":[101],"also":[104],"conducts":[105],"deep":[107],"examination":[108],"framework":[111],"evaluate":[113],"identify":[115],"vulnerabilities":[117,139],"linked":[120],"security,":[122],"scalability,":[123],"protocols":[125],"used":[126],"communications,":[128],"resource":[129],"management,":[130],"decision-making":[132],"processes.":[133],"By":[134],"understanding":[135],"challenges":[137],"discussed,":[140],"aims":[143],"contribute":[145],"towards":[146],"development":[148],"more":[150],"resilient":[151],"as":[152,154],"well":[153],"robust":[155],"mitigation":[158],"approaches":[159],"affirming":[161],"availability":[163],"integrity":[165],"critical":[167],"online":[168],"services.":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
