{"id":"https://openalex.org/W2051047794","doi":"https://doi.org/10.1109/sncc.2014.6866508","title":"Distributed Denial of service attacks and its effects on Cloud environment- a survey","display_name":"Distributed Denial of service attacks and its effects on Cloud environment- a survey","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2051047794","doi":"https://doi.org/10.1109/sncc.2014.6866508","mag":"2051047794"},"language":"en","primary_location":{"id":"doi:10.1109/sncc.2014.6866508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sncc.2014.6866508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2014 International Symposium on Networks, Computers and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109384620","display_name":"B. Prabadevi","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. Prabadevi","raw_affiliation_strings":["School of Information Technology and Engineering, VIT University, Vellore, India","School of Information Technology and Engineering , VIT University , Vellore , India"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Engineering, VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Information Technology and Engineering , VIT University , Vellore , India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087229821","display_name":"N. Jeyanthi","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Jeyanthi","raw_affiliation_strings":["School of Information Technology and Engineering, VIT University, Vellore, India","School of Information Technology and Engineering , VIT University , Vellore , India"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Engineering, VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Information Technology and Engineering , VIT University , Vellore , India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109384620"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":3.4481,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.93162677,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9458743929862976},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8405637741088867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.767382025718689},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.7450723052024841},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7220841646194458},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6695692539215088},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6556349396705627},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5831708908081055},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5753212571144104},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.47818973660469055},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29123809933662415},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12555065751075745},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0829942524433136},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07137265801429749}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9458743929862976},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8405637741088867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.767382025718689},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.7450723052024841},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7220841646194458},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6695692539215088},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6556349396705627},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5831708908081055},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5753212571144104},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.47818973660469055},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29123809933662415},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12555065751075745},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0829942524433136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07137265801429749},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sncc.2014.6866508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sncc.2014.6866508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2014 International Symposium on Networks, Computers and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W127475345","https://openalex.org/W1524600321","https://openalex.org/W1623992152","https://openalex.org/W1657108660","https://openalex.org/W1984922480","https://openalex.org/W2053451652","https://openalex.org/W2096908809","https://openalex.org/W2110062787","https://openalex.org/W2114319428","https://openalex.org/W2117222554","https://openalex.org/W2124563017","https://openalex.org/W2125513999","https://openalex.org/W2155883880","https://openalex.org/W2158673492","https://openalex.org/W2313080551","https://openalex.org/W2321181722","https://openalex.org/W2329672759","https://openalex.org/W3105497638","https://openalex.org/W4285719527","https://openalex.org/W6605145278","https://openalex.org/W6636544143","https://openalex.org/W6637200324","https://openalex.org/W6676215721","https://openalex.org/W6677375321","https://openalex.org/W6683222588","https://openalex.org/W6700325591"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Security":[0],"in":[1,25,82,128],"this":[2,83,117],"world":[3],"of":[4,20,32,40,52,73,85,97,125],"digital":[5],"computing":[6,29],"plays":[7],"a":[8,37,102,142],"typical":[9],"role,":[10],"since":[11],"all":[12],"the":[13,26,33,62,66,78,89,129,133,149],"operations":[14],"are":[15,22,48],"automated":[16],"and":[17,46,95,111],"large":[18],"volumes":[19],"data":[21,45],"being":[23],"maintained":[24],"servers.":[27],"Cloud":[28,130],"is":[30,42,77,88],"one":[31],"evolving":[34],"technologies":[35],"where":[36],"huge":[38],"volume":[39],"storage":[41],"made":[43],"on-line,":[44],"services":[47],"also":[49],"distributed.":[50],"Because":[51],"its":[53],"distributed":[54],"nature,":[55],"they":[56],"have":[57],"become":[58],"easy":[59],"targets":[60],"for":[61,140],"intruders":[63],"to":[64,93],"exploit":[65],"information.":[67],"The":[68],"well":[69],"known":[70],"Distributed":[71],"Denial":[72],"Service":[74],"(DDoS)":[75],"attack":[76],"most":[79],"prominent":[80],"attacks":[81,127],"area":[84],"computing.":[86],"DDoS":[87,107,126,150],"single":[90],"largest":[91],"threat":[92],"internet":[94,96],"things.":[98],"This":[99],"paper":[100,118],"provides":[101,119],"wide":[103],"survey":[104],"on":[105,123],"various":[106],"attacks,":[108],"their":[109],"vulnerabilities":[110],"countermeasures":[112],"proposed":[113],"against":[114],"them.":[115],"Also":[116],"an":[120],"in-depth":[121],"analysis":[122,134],"effects":[124],"environment.":[131],"Through":[132],"done":[135],"it":[136],"will":[137,147],"be":[138],"useful":[139],"designing":[141],"secured":[143],"cloud":[144],"infrastructure":[145],"which":[146],"abide":[148],"attacks.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
