{"id":"https://openalex.org/W2045243931","doi":"https://doi.org/10.1109/lanman.2007.4295999","title":"MIDAS: An Impact Scale for DDoS attacks","display_name":"MIDAS: An Impact Scale for DDoS attacks","publication_year":2007,"publication_date":"2007-06-01","ids":{"openalex":"https://openalex.org/W2045243931","doi":"https://doi.org/10.1109/lanman.2007.4295999","mag":"2045243931"},"language":"en","primary_location":{"id":"doi:10.1109/lanman.2007.4295999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lanman.2007.4295999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 15th IEEE Workshop on Local &amp; Metropolitan Area Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110245975","display_name":"Rangarajan Vasudevan","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rangarajan Vasudevan","raw_affiliation_strings":["University of Michigan, USA","Michigan Univ., Ann Arbor"],"affiliations":[{"raw_affiliation_string":"University of Michigan, USA","institution_ids":["https://openalex.org/I27837315"]},{"raw_affiliation_string":"Michigan Univ., Ann Arbor","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003217329","display_name":"Z. Morley Mao","orcid":"https://orcid.org/0000-0002-9844-2055"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Z. Morley Mao","raw_affiliation_strings":["University of Michigan, USA","Michigan Univ., Ann Arbor"],"affiliations":[{"raw_affiliation_string":"University of Michigan, USA","institution_ids":["https://openalex.org/I27837315"]},{"raw_affiliation_string":"Michigan Univ., Ann Arbor","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049422372","display_name":"Oliver Spatscheck","orcid":"https://orcid.org/0000-0003-1555-6303"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Oliver Spatscheck","raw_affiliation_strings":["AT and T Research Laboratories, USA","AT&T Labs-Research. spatsch@research.att.com"],"affiliations":[{"raw_affiliation_string":"AT and T Research Laboratories, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Labs-Research. spatsch@research.att.com","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076342321","display_name":"Jacobus Van der Merwe","orcid":"https://orcid.org/0000-0001-5148-8278"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jacobus Van der Merwe","raw_affiliation_strings":["AT and T Research Laboratories, USA","AT&T Labs-Research. kobus@research.att.com"],"affiliations":[{"raw_affiliation_string":"AT and T Research Laboratories, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Labs-Research. kobus@research.att.com","institution_ids":["https://openalex.org/I1283103587"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110245975"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":0.3366,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.65772134,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"200","last_page":"205"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9426056146621704},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7399312257766724},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6749240159988403},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.6600253582000732},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.6459827423095703},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.516258716583252},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4705617427825928},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46514666080474854},{"id":"https://openalex.org/keywords/tornado","display_name":"Tornado","score":0.42934712767601013},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.4143053889274597},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2217891812324524},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14650467038154602},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13786029815673828},{"id":"https://openalex.org/keywords/meteorology","display_name":"Meteorology","score":0.12473398447036743},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.11035266518592834},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09896630048751831},{"id":"https://openalex.org/keywords/cartography","display_name":"Cartography","score":0.07767164707183838}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9426056146621704},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7399312257766724},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6749240159988403},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.6600253582000732},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.6459827423095703},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.516258716583252},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4705617427825928},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46514666080474854},{"id":"https://openalex.org/C190930322","wikidata":"https://www.wikidata.org/wiki/Q8081","display_name":"Tornado","level":2,"score":0.42934712767601013},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.4143053889274597},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2217891812324524},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14650467038154602},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13786029815673828},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.12473398447036743},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.11035266518592834},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09896630048751831},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.07767164707183838},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/lanman.2007.4295999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lanman.2007.4295999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 15th IEEE Workshop on Local &amp; Metropolitan Area Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.112.6014","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.6014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.eecs.umich.edu/~zmao/Papers/midas.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.114.5234","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.5234","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.research.att.com/~kobus/docs/midas.lanman.2007.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.75,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W54868700","https://openalex.org/W55016686","https://openalex.org/W1518227345","https://openalex.org/W1955507566","https://openalex.org/W2071231410","https://openalex.org/W2122971986","https://openalex.org/W2124478678","https://openalex.org/W6602203936","https://openalex.org/W6602225317","https://openalex.org/W6640908951","https://openalex.org/W6668531408"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"We":[0,82,105],"usually":[1],"have":[2,83],"well-defined":[3],"classification":[4,57],"scales":[5,23],"to":[6,37,135],"estimate":[7,38],"the":[8,18,21,39,49,67,92,111,126,129,138,141],"intensity":[9],"and":[10,20,27,75,102],"impact":[11,40,88,94],"of":[12,41,44,51,62,78,95,110,122,128,140],"natural":[13],"disasters.":[14],"Prominent":[15],"examples":[16],"are":[17],"Richter":[19],"Fujita":[22],"for":[24,120,144],"measuring":[25],"earthquakes":[26],"tornadoes":[28],"respectively.":[29],"In":[30],"this":[31],"paper,":[32],"we":[33,131],"apply":[34],"similar":[35],"ideas":[36],"distributed":[42],"denial":[43],"service":[45],"(DDoS)":[46],"attacks":[47,64],"from":[48,71],"perspective":[50],"network":[52,103,118],"operators.":[53],"Devising":[54],"such":[55],"a":[56,86,96],"scale":[58,113,142],"improves":[59],"our":[60],"understanding":[61],"DDoS":[63,87,97],"by":[65],"assessing":[66],"actual":[68],"damage":[69],"incurred":[70],"an":[72,108],"ISP's":[73],"perspective,":[74],"allows":[76],"comparison":[77],"various":[79],"mitigation":[80],"strategies.":[81],"designed":[84],"MIDAS,":[85],"scale,":[89,130],"based":[90],"on":[91,117],"economic":[93,101],"attack,":[98],"calculated":[99],"using":[100],"data.":[104],"then":[106],"present":[107],"approximation":[109],"MIDAS":[112],"that":[114],"relies":[115],"only":[116],"measurements":[119],"ease":[121],"computation.":[123],"To":[124],"demonstrate":[125],"usefulness":[127],"perform":[132],"sensitivity":[133],"analysis":[134],"qualitatively":[136],"validate":[137],"magnitude":[139],"value":[143],"diverse":[145],"attacks.":[146]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
