{"id":"https://openalex.org/W2095738877","doi":"https://doi.org/10.1109/tc.2003.1176986","title":"Sustaining availability of web services under distributed denial of service attacks","display_name":"Sustaining availability of web services under distributed denial of service attacks","publication_year":2003,"publication_date":"2003-02-01","ids":{"openalex":"https://openalex.org/W2095738877","doi":"https://doi.org/10.1109/tc.2003.1176986","mag":"2095738877"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2003.1176986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2003.1176986","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113943617","display_name":"Jun Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jun Xu","raw_affiliation_strings":["College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","[Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA]"],"affiliations":[{"raw_affiliation_string":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"[Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA]","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078563565","display_name":"Wooyong Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wooyong Lee","raw_affiliation_strings":["College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","[Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA]"],"affiliations":[{"raw_affiliation_string":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"[Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA]","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113943617"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":6.1383,"has_fulltext":false,"cited_by_count":135,"citation_normalized_percentile":{"value":0.9659886,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"52","issue":"2","first_page":"195","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9376823902130127},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.8182272911071777},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.811781108379364},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7963443994522095},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6821518540382385},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5685817003250122},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.4886961281299591},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4803244173526764},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4571284353733063},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10457301139831543}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9376823902130127},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.8182272911071777},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.811781108379364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7963443994522095},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6821518540382385},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5685817003250122},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.4886961281299591},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4803244173526764},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4571284353733063},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10457301139831543}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2003.1176986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2003.1176986","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W112464476","https://openalex.org/W118842186","https://openalex.org/W1502099332","https://openalex.org/W1524600321","https://openalex.org/W1584514021","https://openalex.org/W1686269893","https://openalex.org/W1896822992","https://openalex.org/W1967612926","https://openalex.org/W1967949770","https://openalex.org/W1988171572","https://openalex.org/W2001619556","https://openalex.org/W2031446819","https://openalex.org/W2045168279","https://openalex.org/W2057105367","https://openalex.org/W2069749081","https://openalex.org/W2090331681","https://openalex.org/W2097831241","https://openalex.org/W2106539366","https://openalex.org/W2106655090","https://openalex.org/W2109895876","https://openalex.org/W2115823234","https://openalex.org/W2117222554","https://openalex.org/W2117636524","https://openalex.org/W2119030343","https://openalex.org/W2133094699","https://openalex.org/W2140471436","https://openalex.org/W2145185087","https://openalex.org/W2147053931","https://openalex.org/W2149644620","https://openalex.org/W2150228605","https://openalex.org/W2154178154","https://openalex.org/W2157157130","https://openalex.org/W2160615184","https://openalex.org/W2162133150","https://openalex.org/W2162686919","https://openalex.org/W2164561363","https://openalex.org/W2170771030","https://openalex.org/W2398870078","https://openalex.org/W2466575204","https://openalex.org/W2484332391","https://openalex.org/W2864752163","https://openalex.org/W3143248510","https://openalex.org/W3160814718","https://openalex.org/W4229657284","https://openalex.org/W4236793779","https://openalex.org/W4250493029","https://openalex.org/W4253049905","https://openalex.org/W4300591638","https://openalex.org/W6604770868","https://openalex.org/W6631038763","https://openalex.org/W6634982741","https://openalex.org/W6647280810","https://openalex.org/W6675162901","https://openalex.org/W6675553754","https://openalex.org/W6677375321","https://openalex.org/W6682144364","https://openalex.org/W6682498991","https://openalex.org/W6712774581","https://openalex.org/W6719694050","https://openalex.org/W6721869696"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2187421104","https://openalex.org/W2376172429","https://openalex.org/W2189542741","https://openalex.org/W2353151461","https://openalex.org/W3189446050","https://openalex.org/W3142394876","https://openalex.org/W3118508392","https://openalex.org/W2363986426","https://openalex.org/W2148797255"],"abstract_inverted_index":{"The":[0,48,117],"recent":[1],"tide":[2],"of":[3,6,41,65,112,121],"Distributed":[4],"Denial":[5],"Service":[7],"(DDoS)":[8],"attacks":[9,18],"against":[10],"high-profile":[11],"web":[12,42],"sites":[13],"demonstrate":[14,165],"how":[15,21],"devastating":[16],"DDoS":[17,33,46,66,115,141],"are":[19,102],"and":[20,57,81,143,163],"defenseless":[22],"the":[23,39,122,135,144,160,166],"Internet":[24],"is":[25,54,124],"under":[26],"such":[27],"attacks.":[28,47,116],"We":[29,147],"design":[30],"a":[31,62,109,128,140,150,155],"practical":[32],"defense":[34],"system":[35,53,123,167],"that":[36,73],"can":[37,78],"protect":[38,58],"availability":[40],"services":[43],"during":[44,114,169],"severe":[45],"basic":[49],"idea":[50],"behind":[51],"our":[52],"to":[55,75,94,104,108,153,164],"isolate":[56],"legitimate":[59,95],"traffic":[60,67,96],"from":[61],"huge":[63],"volume":[64],"when":[68],"an":[69,170],"attack":[70],"occurs.":[71],"Traffic":[72],"needs":[74],"be":[76,79],"protected":[77,82],"recognized":[80],"using":[83],"efficient":[84],"cryptographic":[85],"techniques.":[86],"Therefore,":[87],"by":[88,98],"provisioning":[89],"adequate":[90,106],"resource":[91],"(e.g.,":[92],"bandwidth)":[93],"separated":[97],"this":[99],"process,":[100],"we":[101],"able":[103],"provide":[105],"service":[107],"large":[110],"percentage":[111],"clients":[113],"worst-case":[118],"performance":[119],"(effectiveness)":[120],"evaluated":[125],"based":[126],"on":[127],"novel":[129],"game":[130],"theoretical":[131],"framework,":[132],"which":[133],"characterizes":[134],"natural":[136],"adversarial":[137],"relationship":[138],"between":[139],"adversary":[142],"proposed":[145],"system.":[146],"also":[148],"conduct":[149],"simulation":[151],"study":[152],"verify":[154],"key":[156],"assumption":[157],"used":[158],"in":[159],"game-theoretical":[161],"analysis":[162],"dynamics":[168],"attack.":[171]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
