{"id":"https://openalex.org/W2131714022","doi":"https://doi.org/10.1109/iwcmc.2013.6583539","title":"Optimizing agent placement for flow reconstruction of DDoS attacks","display_name":"Optimizing agent placement for flow reconstruction of DDoS attacks","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2131714022","doi":"https://doi.org/10.1109/iwcmc.2013.6583539","mag":"2131714022"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2013.6583539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2013.6583539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003580218","display_name":"\u00d6mer Demir","orcid":"https://orcid.org/0000-0003-4376-8733"},"institutions":[{"id":"https://openalex.org/I181033969","display_name":"Police Academy","ror":"https://ror.org/03p6h3k49","country_code":"TR","type":"education","lineage":["https://openalex.org/I181033969"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Omer Demir","raw_affiliation_strings":["Department of Information Technology, Turkish National Police, Ankara, Turkey","Dept. of Inf. Tech., Turkish Nat. Police, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Turkish National Police, Ankara, Turkey","institution_ids":["https://openalex.org/I181033969"]},{"raw_affiliation_string":"Dept. of Inf. Tech., Turkish Nat. Police, Ankara, Turkey","institution_ids":["https://openalex.org/I181033969"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091193777","display_name":"Bilal Khan","orcid":"https://orcid.org/0000-0002-0382-4502"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]},{"id":"https://openalex.org/I92507152","display_name":"John Jay College of Criminal Justice","ror":"https://ror.org/01p9rc392","country_code":"US","type":"education","lineage":["https://openalex.org/I92507152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bilal Khan","raw_affiliation_strings":["Department of Math & Computer Science, John Jay College, City University of New York, New York, USA","Dept. of Math. & Comp. Sci, CUNY, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Math & Computer Science, John Jay College, City University of New York, New York, USA","institution_ids":["https://openalex.org/I92507152","https://openalex.org/I174216632"]},{"raw_affiliation_string":"Dept. of Math. & Comp. Sci, CUNY, New York, NY, USA","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085226559","display_name":"Ghassen Ben Brahim","orcid":"https://orcid.org/0000-0001-8883-1244"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ghassen Ben Brahim","raw_affiliation_strings":["Computer Science Department, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","Comput. Sci. Dept., Prince Mohamed Univ., Al-Khobar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]},{"raw_affiliation_string":"Comput. Sci. Dept., Prince Mohamed Univ., Al-Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008695053","display_name":"Ala Al\u2010Fuqaha","orcid":"https://orcid.org/0000-0002-0903-1204"},"institutions":[{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ala Al-Fuqaha","raw_affiliation_strings":["Computer Science Department, Western Michigan University, Kalamazoo, USA","Comput. Sci. Dept., Western Michigan Univ., Kalamazoo, MI, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Western Michigan University, Kalamazoo, USA","institution_ids":["https://openalex.org/I141649380"]},{"raw_affiliation_string":"Comput. Sci. Dept., Western Michigan Univ., Kalamazoo, MI, USA","institution_ids":["https://openalex.org/I141649380"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003580218"],"corresponding_institution_ids":["https://openalex.org/I181033969"],"apc_list":null,"apc_paid":null,"fwci":0.3624,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67990976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"83","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9028968811035156},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8286001682281494},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.8237223625183105},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7332366108894348},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7275214195251465},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.6529157757759094},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5835447907447815},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5297276377677917},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.49684861302375793},{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.4588594436645508},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.432973712682724},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4124802350997925},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37102359533309937},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18628782033920288}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9028968811035156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8286001682281494},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.8237223625183105},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7332366108894348},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7275214195251465},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.6529157757759094},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5835447907447815},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5297276377677917},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.49684861302375793},{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.4588594436645508},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.432973712682724},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4124802350997925},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37102359533309937},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18628782033920288},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2013.6583539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2013.6583539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1967949770","https://openalex.org/W2089276145","https://openalex.org/W2096802008","https://openalex.org/W2117222554","https://openalex.org/W2119030343","https://openalex.org/W2123845384","https://openalex.org/W2175892715","https://openalex.org/W6675978268"],"related_works":["https://openalex.org/W1968168724","https://openalex.org/W2353701916","https://openalex.org/W2353807305","https://openalex.org/W2184397768","https://openalex.org/W2199179552","https://openalex.org/W1493760256","https://openalex.org/W2151002785","https://openalex.org/W2359323920","https://openalex.org/W2097740006","https://openalex.org/W1500725831"],"abstract_inverted_index":{"The":[0,48,70,130],"Internet":[1],"today":[2],"continues":[3],"to":[4,7,133,145,149,154,159,185,189,221],"be":[5],"vulnerable":[6],"distributed":[8],"denial":[9],"of":[10,18,31,38,58,68,83,93,113,137,172,241],"service":[11],"(DDoS)":[12],"attacks.":[13,33,69],"We":[14,119,162],"consider":[15],"the":[16,27,46,63,96,100,111,116,135,142,147,180,190],"design":[17,217],"a":[19,51,175,200,204,215,223],"scalable":[20],"agent-based":[21,127],"system":[22,35,42,71,97,108,117,205,227],"for":[23,125],"collecting":[24],"information":[25,61,115],"about":[26,62],"structure":[28,67,234],"and":[29,53,65,103,110,193,212],"dynamics":[30],"DDoS":[32,76,128,224],"Our":[34],"requires":[36],"placement":[37,92,123,197],"agents":[39,49,94,173,208],"on":[40],"inter-autonomous":[41],"(AS)":[43],"links":[44],"in":[45,174,179,206,235],"Internet.":[47],"implement":[50],"self-organizing":[52],"totally":[54],"decentralized":[55],"mechanism":[56],"capable":[57],"reconstructing":[59],"topological":[60],"spatial":[64],"temporal":[66],"is":[72,229],"effective":[73,230],"at":[74,80,231,238],"recovering":[75,232],"attack":[77,138,233],"structure,":[78],"even":[79],"moderate":[81,239],"levels":[82,240],"deployment.":[84,242],"In":[85],"this":[86],"paper,":[87],"we":[88,151],"demonstrate":[89],"how":[90],"careful":[91],"within":[95],"can":[98],"improve":[99],"system's":[101],"effectiveness":[102],"provide":[104,214],"better":[105],"tradeoffs":[106],"between":[107],"parameters":[109],"quality":[112],"structural":[114],"generates.":[118],"introduced":[120],"two":[121,167],"agent":[122],"algorithms":[124],"our":[126],"system.":[129],"first":[131,181],"attempts":[132],"maximize":[134,146],"percentage":[136],"flows":[139,158],"detected,":[140],"while":[141],"second":[143,191],"tries":[144],"extent":[148],"which":[150,177,207,220],"are":[152,169,209],"able":[153],"trace":[155],"back":[156],"detected":[157],"their":[160],"sources.":[161],"show,":[163],"somewhat":[164],"surprisingly,":[165],"these":[166],"objectives":[168],"concomitant.":[170],"Placement":[171],"manner":[176],"optimizes":[178],"criterion":[182],"tends":[183],"also":[184],"optimize":[186],"with":[187],"respect":[188],"criterion,":[192],"vice":[194],"versa.":[195],"Both":[196],"schemes":[198],"show":[199],"marked":[201],"improvement":[202],"over":[203],"placed":[210],"randomly,":[211],"thus":[213],"concrete":[216],"process":[218],"by":[219],"instrument":[222],"flow":[225],"reconstruction":[226],"that":[228],"large":[236],"networks":[237]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
