{"id":"https://openalex.org/W2107525167","doi":"https://doi.org/10.1109/tifs.2013.2291970","title":"Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks","display_name":"Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks","publication_year":2014,"publication_date":"2014-01-31","ids":{"openalex":"https://openalex.org/W2107525167","doi":"https://doi.org/10.1109/tifs.2013.2291970","mag":"2107525167"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2013.2291970","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2291970","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101859299","display_name":"Yajuan Tang","orcid":"https://orcid.org/0000-0002-8741-2934"},"institutions":[{"id":"https://openalex.org/I32574673","display_name":"Shantou University","ror":"https://ror.org/01a099706","country_code":"CN","type":"education","lineage":["https://openalex.org/I32574673"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yajuan Tang","raw_affiliation_strings":["Department of Electronic and Information Engineering, Shantou University, Shantou, China","Dept. of Electron. & Inf. Eng., Shantou Univ., Shantou, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Information Engineering, Shantou University, Shantou, China","institution_ids":["https://openalex.org/I32574673"]},{"raw_affiliation_string":"Dept. of Electron. & Inf. Eng., Shantou Univ., Shantou, China","institution_ids":["https://openalex.org/I32574673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing and the Shenzhen Research Institute, The Hong Kong Polytechnic University, Hong Kong","Dept. of Comput. & the Shenzhen Res. Inst., Hong Kong Polytech. Univ., Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing and the Shenzhen Research Institute, The Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Dept. of Comput. & the Shenzhen Res. Inst., Hong Kong Polytech. Univ., Hong Kong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103175086","display_name":"Qing Hui","orcid":"https://orcid.org/0000-0001-9488-5257"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qing Hui","raw_affiliation_strings":["Department of Mechanical Engineering, Texas Tech University, Lubbock, TX, USA","[Dept. of Mech. Eng., Texas Tech. Univ., Lubbock, TX, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]},{"raw_affiliation_string":"[Dept. of Mech. Eng., Texas Tech. Univ., Lubbock, TX, USA]","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006486786","display_name":"Rocky K. C. Chang","orcid":"https://orcid.org/0000-0002-2648-5814"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Rocky K. C. Chang","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong","Dept. of Comput., Hong Kong Polytech. Univ., Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Dept. of Comput., Hong Kong Polytech. Univ., Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101859299"],"corresponding_institution_ids":["https://openalex.org/I32574673"],"apc_list":null,"apc_paid":null,"fwci":7.241,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.97326579,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"3","first_page":"339","last_page":"353"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8296188116073608},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7003406882286072},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6574239730834961},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6414271593093872},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.578026294708252},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5182352066040039},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.46812903881073},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4388974606990814},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4249383807182312},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4188547730445862},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12432041764259338}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8296188116073608},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7003406882286072},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6574239730834961},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6414271593093872},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.578026294708252},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5182352066040039},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.46812903881073},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4388974606990814},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4249383807182312},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4188547730445862},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12432041764259338},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2013.2291970","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2291970","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/10734","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/10734","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal/Magazine Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W135750602","https://openalex.org/W151530557","https://openalex.org/W178056938","https://openalex.org/W633708014","https://openalex.org/W1487127700","https://openalex.org/W1518702348","https://openalex.org/W1545677646","https://openalex.org/W1552094772","https://openalex.org/W1572793278","https://openalex.org/W1574779442","https://openalex.org/W1860000316","https://openalex.org/W1943800867","https://openalex.org/W1999392360","https://openalex.org/W2002016612","https://openalex.org/W2015244008","https://openalex.org/W2018992824","https://openalex.org/W2022213562","https://openalex.org/W2023285936","https://openalex.org/W2035536878","https://openalex.org/W2042166926","https://openalex.org/W2048058892","https://openalex.org/W2053395487","https://openalex.org/W2065308442","https://openalex.org/W2073886204","https://openalex.org/W2076420009","https://openalex.org/W2104692292","https://openalex.org/W2107164370","https://openalex.org/W2116953559","https://openalex.org/W2118741873","https://openalex.org/W2118816024","https://openalex.org/W2119227347","https://openalex.org/W2123002543","https://openalex.org/W2128838486","https://openalex.org/W2130583399","https://openalex.org/W2132364035","https://openalex.org/W2144266792","https://openalex.org/W2144931393","https://openalex.org/W2145734278","https://openalex.org/W2145933521","https://openalex.org/W2146411033","https://openalex.org/W2146629283","https://openalex.org/W2146762449","https://openalex.org/W2148014295","https://openalex.org/W2148061077","https://openalex.org/W2154217663","https://openalex.org/W2158914121","https://openalex.org/W2159110945","https://openalex.org/W2162193912","https://openalex.org/W2162305081","https://openalex.org/W2165976789","https://openalex.org/W2402860450","https://openalex.org/W2970528191","https://openalex.org/W3036994337","https://openalex.org/W3201048512","https://openalex.org/W4213107800","https://openalex.org/W4232746023","https://openalex.org/W4249492311","https://openalex.org/W6605442156","https://openalex.org/W6631284866","https://openalex.org/W6634543522","https://openalex.org/W6655916619","https://openalex.org/W6677591670","https://openalex.org/W6678445875","https://openalex.org/W6681645342","https://openalex.org/W6683089564","https://openalex.org/W6712973307"],"related_works":["https://openalex.org/W3153708520","https://openalex.org/W1974343333","https://openalex.org/W141916771","https://openalex.org/W2376398693","https://openalex.org/W2024164043","https://openalex.org/W3137235688","https://openalex.org/W2089917086","https://openalex.org/W2766405666","https://openalex.org/W1657769681","https://openalex.org/W3196426613"],"abstract_inverted_index":{"Feedback":[0],"control":[1,62,146],"is":[2,77],"a":[3,85,95,121,143,189,208],"critical":[4],"element":[5],"in":[6,34],"many":[7,219],"Internet":[8],"services":[9],"(e.g.,":[10],"quality-of-service":[11],"aware":[12],"applications).":[13],"Recent":[14],"research":[15],"has":[16],"demonstrated":[17],"the":[18,40,45,53,60,78,99,116,131,136,139,152,156,163,168,176,182,195,227,230,233,236,239,242,247,259],"vulnerability":[19],"of":[20,80,98,101,138,170,197,229],"some":[21],"feedback-control":[22,87,107],"based":[23,88,108],"applications":[24],"to":[25,38,93,178,192,207],"low-rate":[26],"denial-of-service":[27],"(LRDoS)":[28],"attacks,":[29,241],"which":[30],"send":[31],"high-intensity":[32],"requests":[33],"an":[35,81,102,198,212],"ON/OFF":[36],"pattern":[37],"degrade":[39],"victim's":[41],"performance":[42],"and":[43,59,90,124,166,204,211,238,249],"evade":[44],"detection":[46],"designed":[47],"for":[48,245],"traditional":[49],"DoS":[50],"attacks.":[51],"However,":[52],"intricate":[54],"interaction":[55],"between":[56,235],"LRDoS":[57,82,103,140,171,199,240],"attacks":[58,172],"feedback":[61,145],"mechanism":[63],"remains":[64],"largely":[65],"unknown.":[66],"In":[67,185],"this":[68],"paper,":[69],"we":[70,114,187],"address":[71],"two":[72],"fundamental":[73],"questions:":[74],"1)":[75],"what":[76],"impact":[79,100,137,196],"attack":[83,104,119,141,153,164,200,225],"on":[84,105,135,142,201],"general":[86,144],"system":[89,117,123,177],"2)":[91],"how":[92],"conduct":[94,130],"systematic":[96],"evaluation":[97],"specific":[106,202],"systems.":[109],"To":[110],"tackle":[111],"these":[112],"problems,":[113],"model":[115],"under":[118],"as":[120,223],"switched":[122],"then":[125],"examine":[126],"its":[127],"properties.":[128],"We":[129,148],"first":[132],"theoretical":[133,260],"investigation":[134,217],"system.":[147],"formally":[149],"show":[150],"that":[151,173],"can":[154,174],"make":[155],"system's":[157,231],"steady-state":[158],"error":[159],"oscillate":[160],"along":[161],"with":[162,258],"period,":[165],"prove":[167],"existence":[169],"force":[175],"be":[179],"far":[180],"off":[181],"desired":[183],"state.":[184],"addition,":[186],"propose":[188],"novel":[190],"methodology":[191],"systematically":[193],"characterize":[194],"systems,":[203],"apply":[205],"it":[206],"web":[209],"server":[210],"IBM":[213],"Notes":[214],"server.":[215],"This":[216],"obtains":[218],"new":[220,224],"insights,":[221],"such":[222],"scenarios,":[226],"bound":[228,237],"states,":[232],"relationship":[234],"close-formed":[243],"equations":[244],"quantifying":[246],"impact,":[248],"so":[250],"on.":[251],"The":[252],"extensive":[253],"experimental":[254],"results":[255],"are":[256],"congruent":[257],"analysis.":[261]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
