{"id":"https://openalex.org/W4392666342","doi":"https://doi.org/10.1109/tcc.2024.3374798","title":"Evaluation of Application Layer DDoS Attack Effect in Cloud Native Applications","display_name":"Evaluation of Application Layer DDoS Attack Effect in Cloud Native Applications","publication_year":2024,"publication_date":"2024-03-11","ids":{"openalex":"https://openalex.org/W4392666342","doi":"https://doi.org/10.1109/tcc.2024.3374798"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2024.3374798","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tcc.2024.3374798","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057101680","display_name":"Kewei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kewei Wang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","School of Cyberspace Science and Technology, Beijing Institute of Technology, 5 South Zhongguancun Street, Haidian District, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1197-2038","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, 5 South Zhongguancun Street, Haidian District, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102753688","display_name":"Changzhen Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changzhen Hu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","School of Cyberspace Science and Technology, Beijing Institute of Technology, 5 South Zhongguancun Street, Haidian District, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, 5 South Zhongguancun Street, Haidian District, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080652607","display_name":"Chun Shan","orcid":"https://orcid.org/0000-0002-1090-026X"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun Shan","raw_affiliation_strings":["Beijing Key Laboratory of Software Security Engineering Technology, Beijing Institute of Technology, Beijing, China","Beijing Key Laboratory of Software Security Engineering Technology, Beijing Institute of Technology, 5 South Zhongguancun Street, Haidian District, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1090-026X","affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"Beijing Key Laboratory of Software Security Engineering Technology, Beijing Institute of Technology, 5 South Zhongguancun Street, Haidian District, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057101680"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":1.3456,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.80366975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"12","issue":"2","first_page":"522","last_page":"538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8727527856826782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8290339708328247},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7179876565933228},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6893043518066406},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.568292498588562},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.525473952293396},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5249863862991333},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.46697497367858887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4662576913833618},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36479151248931885},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3480069637298584},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.27009445428848267},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.15206483006477356},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09508463740348816}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8727527856826782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8290339708328247},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7179876565933228},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6893043518066406},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.568292498588562},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.525473952293396},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5249863862991333},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.46697497367858887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4662576913833618},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36479151248931885},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3480069637298584},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.27009445428848267},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.15206483006477356},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09508463740348816},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2024.3374798","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tcc.2024.3374798","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G7376754820","display_name":null,"funder_award_id":"U1636115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1971111941","https://openalex.org/W1972950122","https://openalex.org/W2053186076","https://openalex.org/W2077530642","https://openalex.org/W2118050624","https://openalex.org/W2410063969","https://openalex.org/W2498775860","https://openalex.org/W2540373227","https://openalex.org/W2567424702","https://openalex.org/W2597472767","https://openalex.org/W2620774151","https://openalex.org/W2761831203","https://openalex.org/W2774433880","https://openalex.org/W2790686993","https://openalex.org/W2791003924","https://openalex.org/W2795079039","https://openalex.org/W2805474610","https://openalex.org/W2805622383","https://openalex.org/W2890157399","https://openalex.org/W2892142441","https://openalex.org/W2902121396","https://openalex.org/W2918796589","https://openalex.org/W2955533854","https://openalex.org/W2967136126","https://openalex.org/W2973528622","https://openalex.org/W3006144347","https://openalex.org/W3011512329","https://openalex.org/W3015251165","https://openalex.org/W3018067527","https://openalex.org/W3036171432","https://openalex.org/W3070976782","https://openalex.org/W3092450653","https://openalex.org/W3094445672","https://openalex.org/W3115029141","https://openalex.org/W3121723636","https://openalex.org/W3153623691","https://openalex.org/W4223568751","https://openalex.org/W4246954948","https://openalex.org/W4250857377","https://openalex.org/W4281686974","https://openalex.org/W4283208800","https://openalex.org/W4285214552","https://openalex.org/W4293203252","https://openalex.org/W6754357002"],"related_works":["https://openalex.org/W2754163055","https://openalex.org/W2908108831","https://openalex.org/W3005836778","https://openalex.org/W4254515188","https://openalex.org/W2375951120","https://openalex.org/W2954653956","https://openalex.org/W2591571751","https://openalex.org/W2552641916","https://openalex.org/W2991861214","https://openalex.org/W4319080686"],"abstract_inverted_index":{"Cloud":[0],"native":[1,85],"application":[2,7,31,79,97,116,184],"is":[3,102,160,180],"especially":[4,54],"susceptible":[5],"to":[6,13,43,58,62,92,104,153],"layer":[8,32,80,98],"DDoS":[9,33,81,99],"attack.":[10,34],"This":[11],"attributes":[12],"the":[14,28,63,74,94,107,112,121,125,133,137,156,163,169,174],"internal":[15],"service":[16],"calls,":[17],"by":[18,111],"which":[19,141,159],"microservices":[20],"cooperate":[21],"and":[22,67,77,168,195],"communicate":[23],"with":[24,69],"each":[25],"other,":[26],"amplifying":[27,108],"effect":[29,95,109],"of":[30,41,52,65,76,96,115,124,136,165],"Since":[35],"different":[36],"services":[37,66],"have":[38],"varying":[39],"degrees":[40],"sensitivity":[42],"an":[44,166],"attack,":[45,100],"a":[46,89],"sophisticated":[47],"attacker":[48],"can":[49],"take":[50],"advantage":[51],"those":[53],"expensive":[55],"API":[56],"calls":[57],"produce":[59],"serious":[60],"damage":[61],"availability":[64],"applications":[68],"ease.":[70],"To":[71],"better":[72],"analyze":[73],"severity":[75],"mitigate":[78],"attacks":[82,142],"in":[83,140,173,182],"cloud":[84],"applications,":[86],"we":[87,148],"propose":[88],"novel":[90],"method":[91,179],"evaluate":[93],"that":[101,188],"able":[103],"quantitatively":[105,154],"characterize":[106],"introduced":[110],"complex":[113],"structure":[114],"system.":[117],"We":[118,186],"first":[119],"present":[120],"descriptive":[122],"model":[123],"scenario.":[126],"Then,":[127],"Riemannian":[128],"manifolds":[129],"are":[130,143],"constructed":[131],"as":[132,145],"state":[134,175],"spaces":[135],"attack":[138,157,167],"scenarios,":[139],"described":[144],"homeomorphisms.":[146],"Finally,":[147],"apply":[149],"differential":[150],"geometry":[151],"principles":[152],"calculate":[155],"effect,":[158],"derived":[161],"from":[162],"action":[164],"movement":[170],"it":[171],"produces":[172],"spaces.":[176],"The":[177],"proposed":[178],"validated":[181],"various":[183],"scenarios.":[185],"show":[187],"our":[189],"approach":[190],"provides":[191],"accurate":[192],"evaluation":[193],"results,":[194],"outperforms":[196],"existing":[197],"solutions.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
