{"id":"https://openalex.org/W2127258337","doi":"https://doi.org/10.1109/percom.2009.4912895","title":"Defending Grid Web Services from XDoS attacks by SOTA","display_name":"Defending Grid Web Services from XDoS attacks by SOTA","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2127258337","doi":"https://doi.org/10.1109/percom.2009.4912895","mag":"2127258337"},"language":"en","primary_location":{"id":"doi:10.1109/percom.2009.4912895","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percom.2009.4912895","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Pervasive Computing and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042065185","display_name":"Ashley Chonka","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ashley Chonka","raw_affiliation_strings":["School of Engineering & Information Technology, Deakin University, Geelong, Australia","School of Engineering & Information Technology, Deakin University, Geelong, 3220, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering & Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Engineering & Information Technology, Deakin University, Geelong, 3220, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["School of Engineering & Information Technology, Deakin University, Geelong, Australia","School of Engineering & Information Technology, Deakin University, Geelong, 3220, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering & Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Engineering & Information Technology, Deakin University, Geelong, 3220, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Management and Information Systems, Central Queensland University, Rockhampton, Australia","School of Management and Information Systems, Central Queensland University, Rockhampton, 4702, Australia"],"affiliations":[{"raw_affiliation_string":"School of Management and Information Systems, Central Queensland University, Rockhampton, Australia","institution_ids":["https://openalex.org/I74899385"]},{"raw_affiliation_string":"School of Management and Information Systems, Central Queensland University, Rockhampton, 4702, Australia","institution_ids":["https://openalex.org/I74899385"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042065185"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":3.2593,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.92611072,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7763378620147705},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7519999146461487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.718876838684082},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.6854835152626038},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5434955954551697},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4631582796573639},{"id":"https://openalex.org/keywords/ws-policy","display_name":"WS-Policy","score":0.4481312036514282},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.4344981014728546},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4282824397087097},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42592233419418335},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.38784316182136536},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33581972122192383},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.2571699619293213},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22965854406356812},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14053219556808472}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7763378620147705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7519999146461487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.718876838684082},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.6854835152626038},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5434955954551697},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4631582796573639},{"id":"https://openalex.org/C190515685","wikidata":"https://www.wikidata.org/wiki/Q749179","display_name":"WS-Policy","level":5,"score":0.4481312036514282},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.4344981014728546},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4282824397087097},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42592233419418335},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38784316182136536},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33581972122192383},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.2571699619293213},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22965854406356812},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14053219556808472},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/percom.2009.4912895","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percom.2009.4912895","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Pervasive Computing and Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30028984","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1499542368","https://openalex.org/W1778695998","https://openalex.org/W1967335816","https://openalex.org/W1967949770","https://openalex.org/W1992178984","https://openalex.org/W2091257550","https://openalex.org/W2118718920","https://openalex.org/W2132531706","https://openalex.org/W2149960049","https://openalex.org/W2152498909","https://openalex.org/W2154010459","https://openalex.org/W2158296636","https://openalex.org/W2187360174","https://openalex.org/W2340406763","https://openalex.org/W3022131440","https://openalex.org/W6630035683"],"related_works":["https://openalex.org/W2128388188","https://openalex.org/W2384679996","https://openalex.org/W2266573831","https://openalex.org/W2388498275","https://openalex.org/W1985294818","https://openalex.org/W2357775713","https://openalex.org/W2613374639","https://openalex.org/W2156201195","https://openalex.org/W2503758842","https://openalex.org/W2988401211"],"abstract_inverted_index":{"Grid":[0,36,141],"Web":[1,37],"Services":[2],"are":[3,15,78,112],"still":[4,93],"relevantly":[5],"a":[6,41,45,150],"new":[7,42,46],"to":[8,18,22,35,83,115,140,156],"business":[9],"systems,":[10],"and":[11,27,111,136,179],"as":[12,61,95],"more":[13],"systems":[14],"being":[16],"attached":[17],"it,":[19],"any":[20,67,86],"threat":[21],"it":[23],"could":[24],"bring":[25],"collapse":[26],"huge":[28],"harm.":[29],"Some":[30],"of":[31,44,48,55,89,117],"these":[32,76],"potential":[33],"threats":[34],"services":[38,103],"come":[39],"in":[40,158,167],"form":[43],"denial":[47],"service":[49],"attack":[50],"(DoS),":[51,91],"called":[52,130,154],"XML":[53],"Denial":[54,88],"Service":[56,90,131],"or":[57],"XDOS":[58],"attacks.":[59],"Though,":[60],"yet,":[62],"there":[63],"have":[64,74],"not":[65,113],"been":[66],"reported":[68],"attacks":[69,77,178],"from":[70],"the":[71,119],"media,":[72],"we":[73,124],"observed":[75],"actually":[79],"far":[80],"less":[81],"complex":[82],"implement":[84],"than":[85],"previous":[87,128],"but":[92],"just":[94],"affective.":[96],"Current":[97],"security":[98],"applications":[99],"for":[100,105,172],"grid":[101],"web":[102,145],"(WS-Security":[104],"example),":[106],"based":[107],"on":[108,126],"our":[109,127,138],"observations,":[110],"up":[114],"job":[116],"handling":[118],"problem.":[120],"In":[121],"this":[122],"paper,":[123],"build":[125],"work":[129,157],"Oriented":[132],"Traceback":[133],"Architecture":[134],"(SOTA),":[135],"apply":[137],"model":[139],"Networks":[142],"that":[143,165],"employ":[144],"services.":[146],"We":[147],"further":[148],"introduce":[149],"filter":[151],"defence":[152,175],"system,":[153],"XDetector,":[155],"combination":[159],"with":[160,169],"SOTA.":[161],"Our":[162],"results":[163],"show":[164],"SOTA":[166],"conjunction":[168],"XDetector":[170],"makes":[171],"an":[173],"effective":[174],"against":[176],"XDoS":[177],"upcoming":[180],"DXDoS.":[181]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
