{"id":"https://openalex.org/W1860000316","doi":"https://doi.org/10.1109/infcom.2005.1498361","title":"Reduction of quality (RoQ) attacks on internet end-systems","display_name":"Reduction of quality (RoQ) attacks on internet end-systems","publication_year":2005,"publication_date":"2005-08-24","ids":{"openalex":"https://openalex.org/W1860000316","doi":"https://doi.org/10.1109/infcom.2005.1498361","mag":"1860000316"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2005.1498361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2005.1498361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071514799","display_name":"Mina Guirguis","orcid":"https://orcid.org/0000-0003-2629-6172"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Guirguis","raw_affiliation_strings":["Computer Science Department, Boston University, Boston, MA, USA","Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101582232","display_name":"Azer Bestavros","orcid":"https://orcid.org/0000-0003-0798-8835"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Bestavros","raw_affiliation_strings":["Computer Science Department, Boston University, Boston, MA, USA","Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044678468","display_name":"Ibrahim Matta","orcid":"https://orcid.org/0000-0003-4528-0344"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"I. Matta","raw_affiliation_strings":["Computer Science Department, Boston University, Boston, MA, USA","Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070954220","display_name":"Y. Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Y. Zhang","raw_affiliation_strings":["Computer Science Department, Boston University, Boston, MA, USA","Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Boston Univ., MA, USA#TAB#","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071514799"],"corresponding_institution_ids":["https://openalex.org/I111088046"],"apc_list":null,"apc_paid":null,"fwci":4.6508,"has_fulltext":false,"cited_by_count":111,"citation_normalized_percentile":{"value":0.95171266,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"2","issue":null,"first_page":"1362","last_page":"1372"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7551169395446777},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7498503923416138},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7186470031738281},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.6087307929992676},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5853279829025269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5556431412696838},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5276809334754944},{"id":"https://openalex.org/keywords/end-user","display_name":"End user","score":0.5134388208389282},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.43637341260910034},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4224667251110077},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33234429359436035},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10016465187072754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7551169395446777},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7498503923416138},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7186470031738281},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.6087307929992676},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5853279829025269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5556431412696838},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5276809334754944},{"id":"https://openalex.org/C91262260","wikidata":"https://www.wikidata.org/wiki/Q528074","display_name":"End user","level":2,"score":0.5134388208389282},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.43637341260910034},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4224667251110077},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33234429359436035},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10016465187072754},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/infcom.2005.1498361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2005.1498361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.126.57","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.57","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.txstate.edu/~mg65/research/papers/infocom05.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.212.2667","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.2667","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.bu.edu/faculty/matta/Papers/roq-web-infocom05.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.67.2993","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.2993","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.bu.edu/fac/best/res/papers/infocom05-roq.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W20974398","https://openalex.org/W53859244","https://openalex.org/W91960293","https://openalex.org/W112022908","https://openalex.org/W135750602","https://openalex.org/W598612581","https://openalex.org/W1538680048","https://openalex.org/W1572793278","https://openalex.org/W1582137406","https://openalex.org/W1589446340","https://openalex.org/W1589804815","https://openalex.org/W1598528243","https://openalex.org/W1677055748","https://openalex.org/W1734123987","https://openalex.org/W1850856875","https://openalex.org/W1892996769","https://openalex.org/W2002165892","https://openalex.org/W2020199335","https://openalex.org/W2044534358","https://openalex.org/W2049717788","https://openalex.org/W2066660519","https://openalex.org/W2073381904","https://openalex.org/W2086207071","https://openalex.org/W2099404265","https://openalex.org/W2100741677","https://openalex.org/W2104507424","https://openalex.org/W2104692292","https://openalex.org/W2109772745","https://openalex.org/W2117994677","https://openalex.org/W2125991052","https://openalex.org/W2126022651","https://openalex.org/W2130583399","https://openalex.org/W2138317811","https://openalex.org/W2144931393","https://openalex.org/W2155629256","https://openalex.org/W2159160833","https://openalex.org/W2162686919","https://openalex.org/W2163887632","https://openalex.org/W2166751304","https://openalex.org/W4213107800","https://openalex.org/W4252597626","https://openalex.org/W6600836969","https://openalex.org/W6602089217","https://openalex.org/W6605442156","https://openalex.org/W6632205112","https://openalex.org/W6635803236","https://openalex.org/W6667320511","https://openalex.org/W6677711145","https://openalex.org/W6681645342"],"related_works":["https://openalex.org/W4299590256","https://openalex.org/W2151749779","https://openalex.org/W3163634122","https://openalex.org/W2110442089","https://openalex.org/W3119482857","https://openalex.org/W2919182614","https://openalex.org/W2166381389","https://openalex.org/W4393280045","https://openalex.org/W2054736184","https://openalex.org/W3159728998"],"abstract_inverted_index":{"Current":[0],"computing":[1],"systems":[2,82],"depend":[3],"on":[4,41,114,169],"adaptation":[5,50],"mechanisms":[6,74],"to":[7,56,83,101],"ensure":[8],"that":[9,28,75,108,124,152],"they":[10],"remain":[11],"in":[12,33,79,195],"quiescent":[13],"operating":[14],"regions.":[15],"These":[16],"regions":[17],"are":[18,76],"often":[19],"defined":[20],"using":[21],"efficiency,":[22],"fairness,":[23],"and":[24,37],"stability":[25],"properties.":[26],"To":[27],"end,":[29],"traditional":[30],"research":[31],"works":[32],"scalable":[34],"server":[35],"architectures":[36],"protocols":[38],"have":[39],"focused":[40],"promoting":[42],"these":[43],"properties":[44],"by":[45,67,145,179],"proposing":[46],"even":[47],"more":[48],"sophisticated":[49],"mechanisms,":[51],"without":[52],"the":[53,69,92,164,176],"proper":[54],"attention":[55],"security":[57,65],"implications.":[58],"In":[59],"this":[60],"paper,":[61],"we":[62],"exemplify":[63],"such":[64],"implications":[66],"exposing":[68],"vulnerabilities":[70],"of":[71,85,94,133,151,166],"admission":[72,117,172],"control":[73,118,159],"widely":[77],"deployed":[78],"Internet":[80,129,192],"end":[81],"reduction":[84],"quality":[86],"(RoQ)":[87],"attacks.":[88],"RoQ":[89,112,167],"attacks":[90,168],"target":[91],"transients":[93],"a":[95,109,158],"system's":[96,153],"adaptive":[97],"behavior":[98],"as":[99],"opposed":[100],"its":[102,134,139],"limited":[103],"steady-state":[104],"capacity.":[105,155],"We":[106,156,174,186],"show":[107],"well":[110],"orchestrated":[111],"attack":[113],"an":[115,128,147,170,180],"end-system":[116,130],"policy":[119],"could":[120,125],"introduce":[121],"significant":[122],"inefficiencies":[123],"potentially":[126],"deprive":[127],"from":[131],"much":[132],"capacity,":[135],"or":[136],"significantly":[137],"reduce":[138],"service":[140],"quality,":[141],"while":[142],"evading":[143],"detection":[144],"consuming":[146],"unsuspicious,":[148],"small":[149],"fraction":[150],"hijacked":[154],"develop":[157],"theoretic":[160],"model":[161],"for":[162],"assessing":[163],"impact":[165],"end-system's":[171],"controller.":[173],"quantify":[175],"damage":[177],"inflicted":[178],"attacker":[181],"through":[182,190],"deriving":[183],"appropriate":[184],"metrics.":[185],"validate":[187],"our":[188,196],"findings":[189],"real":[191],"experiments":[193],"performed":[194],"lab.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":14},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":8}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
