{"id":"https://openalex.org/W7152605462","doi":"https://doi.org/10.1109/icecet63943.2025.11472027","title":"Defending Against Distributed Denial of Service (DDoS) Attacks: A Case Study of CrowdStrike\u2019s Role in Modern Cyber Warfare","display_name":"Defending Against Distributed Denial of Service (DDoS) Attacks: A Case Study of CrowdStrike\u2019s Role in Modern Cyber Warfare","publication_year":2025,"publication_date":"2025-07-03","ids":{"openalex":"https://openalex.org/W7152605462","doi":"https://doi.org/10.1109/icecet63943.2025.11472027"},"language":null,"primary_location":{"id":"doi:10.1109/icecet63943.2025.11472027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032457170","display_name":"Tarik Eltaeib","orcid":null},"institutions":[{"id":"https://openalex.org/I177340980","display_name":"Farmingdale State College","ror":"https://ror.org/010thz337","country_code":"US","type":"education","lineage":["https://openalex.org/I177340980"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tarik Eltaeib","raw_affiliation_strings":["Farmingdale State College,Computer Security,USA"],"affiliations":[{"raw_affiliation_string":"Farmingdale State College,Computer Security,USA","institution_ids":["https://openalex.org/I177340980"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5133288590","display_name":"McCloud Robert","orcid":null},"institutions":[{"id":"https://openalex.org/I130186095","display_name":"Sacred Heart University","ror":"https://ror.org/0085j8z36","country_code":"US","type":"education","lineage":["https://openalex.org/I130186095"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"McCloud Robert","raw_affiliation_strings":["Sacredheart University,Computer Science,USA"],"affiliations":[{"raw_affiliation_string":"Sacredheart University,Computer Science,USA","institution_ids":["https://openalex.org/I130186095"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032457170"],"corresponding_institution_ids":["https://openalex.org/I177340980"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78267414,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5192000269889832,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5192000269889832,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.07970000058412552,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.03290000185370445,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5220999717712402},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.49160000681877136},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4909999966621399},{"id":"https://openalex.org/keywords/denial","display_name":"Denial","score":0.364300012588501},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.29649999737739563},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.2955999970436096}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7026000022888184},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5220999717712402},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5174000263214111},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.49160000681877136},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4909999966621399},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.44339999556541443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37220001220703125},{"id":"https://openalex.org/C2780900520","wikidata":"https://www.wikidata.org/wiki/Q100268981","display_name":"Denial","level":2,"score":0.364300012588501},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.31279999017715454},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3059000074863434},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.29649999737739563},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C2994533931","wikidata":"https://www.wikidata.org/wiki/Q49845","display_name":"Postal service","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.27469998598098755},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2671999931335449}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet63943.2025.11472027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2162969618","https://openalex.org/W2959627510","https://openalex.org/W2971814448","https://openalex.org/W3016554829","https://openalex.org/W3024451836","https://openalex.org/W3034273612","https://openalex.org/W3081910642","https://openalex.org/W3181225367","https://openalex.org/W3189141679","https://openalex.org/W3200241357","https://openalex.org/W4206753314","https://openalex.org/W4213101073","https://openalex.org/W4251894792","https://openalex.org/W4285578286","https://openalex.org/W4307020404","https://openalex.org/W4308145373","https://openalex.org/W4309185071","https://openalex.org/W4316039105","https://openalex.org/W4316253688","https://openalex.org/W4317569417","https://openalex.org/W4319978095","https://openalex.org/W4381235964","https://openalex.org/W4386616764","https://openalex.org/W4390189227","https://openalex.org/W4391797528","https://openalex.org/W4393336635","https://openalex.org/W4394577645","https://openalex.org/W4397032850","https://openalex.org/W4404589023"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"focuses":[2],"on":[3,63],"understanding":[4,210],"Distributed":[5],"Denial":[6],"of":[7,61,87,96,98,191,202,211,214,223,241],"Service":[8],"(DDoS)":[9],"attacks":[10,140,216],"as":[11,20,67,84],"a":[12,21,68,73,107,208],"prominent":[13],"strategy":[14,105],"in":[15,102,130,217,227],"cyber":[16,25,80,219],"warfare,":[17,220],"using":[18],"CrowdStrike":[19,183,226],"case":[22,69,133],"study.":[23],"In":[24],"conflicts,":[26],"particularly":[27],"those":[28],"involving":[29],"nation-states,":[30],"attackers":[31],"often":[32],"target":[33],"critical":[34],"infrastructure,":[35],"aiming":[36],"to":[37,111,237],"cause":[38],"widespread":[39],"disruptions":[40],"while":[41],"concealing":[42],"their":[43],"identities.":[44],"By":[45],"examining":[46],"the":[47,56,93,178,189,200,212,221,238],"July":[48],"2024":[49],"global":[50],"network":[51],"outage,":[52],"this":[53,132,203],"lesson":[54,90,154],"introduces":[55],"concepts,":[57],"techniques,":[58],"and":[59,166,184,197,232],"impact":[60],"cyber-attacks":[62],"real-world":[64],"systems.CrowdStrike":[65],"serves":[66],"study,":[70,134],"showcasing":[71],"how":[72,92,138,233],"leading":[74],"cybersecurity":[75,186],"company":[76],"defends":[77],"against":[78,229],"sophisticated":[79],"threats,":[81,231],"rather":[82],"than":[83],"an":[85,127],"example":[86],"failure.":[88],"The":[89,153],"explains":[91],"company\u2019s":[94],"use":[95],"Internet":[97],"Things":[99],"(IoT)":[100],"sensors":[101],"its":[103],"defense":[104,126,179],"provides":[106],"flexible,":[108],"cloud-based":[109],"solution":[110],"secure":[112],"networks.":[113],"However,":[114],"like":[115,225],"any":[116],"complex":[117],"system,":[118],"vulnerabilities":[119],"can":[120,141],"be":[121,142],"exploited":[122],"by":[123,144,159,182],"attackers,":[124,160],"making":[125],"ongoing":[128],"battle":[129],"cybersecurity.Through":[131],"researchers":[135,205],"will":[136,174,206],"understand":[137],"DDoS":[139,215],"launched":[143],"overwhelming":[145],"networks":[146],"with":[147],"traffic":[148],"or":[149],"exploiting":[150],"system":[151],"vulnerabilities.":[152],"highlights":[155],"key":[156],"techniques":[157],"used":[158],"including":[161],"IP":[162],"spoofing,":[163],"file-based":[164],"disruptions,":[165],"malware":[167],"injections,":[168],"which":[169],"make":[170],"attribution":[171],"difficult.":[172],"Researchers":[173],"also":[175],"learn":[176],"about":[177],"strategies":[180],"employed":[181],"other":[185],"firms,":[187],"illustrating":[188],"importance":[190],"continuous":[192],"monitoring,":[193],"proactive":[194],"threat":[195],"detection,":[196],"rapid":[198],"response.By":[199],"end":[201],"paper,":[204],"gain":[207],"clear":[209],"dynamics":[213],"modern":[218],"role":[222],"companies":[224],"defending":[228],"such":[230],"these":[234],"concepts":[235],"apply":[236],"broader":[239],"field":[240],"cybersecurity.":[242]},"counts_by_year":[],"updated_date":"2026-04-11T06:13:24.991567","created_date":"2026-04-10T00:00:00"}
