{"id":"https://openalex.org/W2505895234","doi":"https://doi.org/10.1109/infocom.2016.7524507","title":"A novel framework for modeling and mitigating distributed link flooding attacks","display_name":"A novel framework for modeling and mitigating distributed link flooding attacks","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W2505895234","doi":"https://doi.org/10.1109/infocom.2016.7524507","mag":"2505895234"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2016.7524507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2016.7524507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1611.02491","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054811310","display_name":"Christos Liaskos","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121775","display_name":"FORTH Institute of Computer Science","ror":"https://ror.org/02tf48g55","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210121775","https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Liaskos","raw_affiliation_strings":["FORTH, Greece"],"affiliations":[{"raw_affiliation_string":"FORTH, Greece","institution_ids":["https://openalex.org/I4210121775"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044487081","display_name":"Vasileios Kotronis","orcid":"https://orcid.org/0000-0002-4964-9121"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Vasileios Kotronis","raw_affiliation_strings":["ETH, Zurich, Switzerland","ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080514654","display_name":"Xenofontas Dimitropoulos","orcid":"https://orcid.org/0000-0003-2600-7633"},"institutions":[{"id":"https://openalex.org/I4210121775","display_name":"FORTH Institute of Computer Science","ror":"https://ror.org/02tf48g55","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210121775","https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Xenofontas Dimitropoulos","raw_affiliation_strings":["FORTH, Greece"],"affiliations":[{"raw_affiliation_string":"FORTH, Greece","institution_ids":["https://openalex.org/I4210121775"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044487081"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":10.3243,"has_fulltext":false,"cited_by_count":71,"citation_normalized_percentile":{"value":0.9835789,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.9038873910903931},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7601975202560425},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6348015666007996},{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.5702018737792969},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5553038120269775},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5426464676856995},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.539085328578949},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47190433740615845},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31587696075439453},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11564919352531433}],"concepts":[{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.9038873910903931},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7601975202560425},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6348015666007996},{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.5702018737792969},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5553038120269775},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5426464676856995},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.539085328578949},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47190433740615845},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31587696075439453},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11564919352531433},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/infocom.2016.7524507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2016.7524507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1611.02491","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1611.02491","pdf_url":"https://arxiv.org/pdf/1611.02491","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1611.02491","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1611.02491","pdf_url":"https://arxiv.org/pdf/1611.02491","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W71992527","https://openalex.org/W1509050436","https://openalex.org/W1574447377","https://openalex.org/W1583443197","https://openalex.org/W1682076822","https://openalex.org/W1766291720","https://openalex.org/W1869854851","https://openalex.org/W1913894557","https://openalex.org/W1975936173","https://openalex.org/W2010816463","https://openalex.org/W2033637032","https://openalex.org/W2111942706","https://openalex.org/W2118404561","https://openalex.org/W2157496457","https://openalex.org/W2162054145","https://openalex.org/W2162969618","https://openalex.org/W2163375756","https://openalex.org/W2164998096","https://openalex.org/W2169087758","https://openalex.org/W2263338482","https://openalex.org/W4251801412","https://openalex.org/W6637850030","https://openalex.org/W6676707958","https://openalex.org/W6683219967"],"related_works":["https://openalex.org/W1518185400","https://openalex.org/W3200586296","https://openalex.org/W4230332972","https://openalex.org/W1998033311","https://openalex.org/W4247322236","https://openalex.org/W4231165741","https://openalex.org/W4295104149","https://openalex.org/W1762272577","https://openalex.org/W4206960768","https://openalex.org/W2935886589"],"abstract_inverted_index":{"Distributed":[0],"link-flooding":[1,92,110],"attacks":[2,8],"constitute":[3],"a":[4,31,49,103,124],"new":[5],"class":[6],"of":[7,16,41,51,57,82,136],"with":[9],"the":[10,17,35,55,72,80],"potential":[11,58,62],"to":[12,61,67,98,109,122,127],"segment":[13],"large":[14],"areas":[15],"Internet.":[18],"Their":[19],"distributed":[20],"nature":[21],"makes":[22,106],"detection":[23,45],"and":[24,38],"mitigation":[25,40],"very":[26],"hard.":[27],"This":[28],"work":[29],"proposes":[30],"novel":[32],"framework":[33,76],"for":[34,114],"analytical":[36,150],"modeling":[37],"optimal":[39],"such":[42],"attacks.":[43],"The":[44,64,75,94,133],"is":[46,77,88,97,138],"modeled":[47],"as":[48],"problem":[50],"relational":[52],"algebra,":[53],"representing":[54],"association":[56],"attackers":[59],"(bots)":[60],"targets.":[63],"analysis":[65],"seeks":[66],"optimally":[68],"dissolve":[69],"all":[70],"but":[71],"malevolent":[73],"associations.":[74],"implemented":[78],"at":[79,141],"level":[81],"online":[83],"Traffic":[84],"Engineering":[85],"(TE),":[86],"which":[87],"naturally":[89],"triggered":[90],"on":[91,145],"events.":[93],"key":[95],"idea":[96],"continuously":[99],"re-route":[100],"traffic":[101],"in":[102],"manner":[104],"that":[105],"persistent":[107],"participation":[108],"events":[111],"highly":[112],"improbable":[113],"any":[115],"benign":[116],"source.":[117],"Thus,":[118],"bots":[119],"are":[120],"forced":[121],"adopt":[123],"suspicious":[125],"behavior":[126],"remain":[128],"effective,":[129],"revealing":[130],"their":[131],"presence.":[132],"load-balancing":[134],"objective":[135],"TE":[137],"not":[139],"affected":[140],"all.":[142],"Extensive":[143],"simulations":[144],"various":[146],"topologies":[147],"validate":[148],"our":[149],"findings.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2016-08-23T00:00:00"}
