{"id":"https://openalex.org/W7128450121","doi":"https://doi.org/10.1109/tifs.2026.3663056","title":"Data Flipping Attack and Defense in Web Edge Caching Systems","display_name":"Data Flipping Attack and Defense in Web Edge Caching Systems","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128450121","doi":"https://doi.org/10.1109/tifs.2026.3663056"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3663056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3663056","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124931666","display_name":"Mengsha Kou","orcid":null},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mengsha Kou","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101916404","display_name":"Xiaoyu Xia","orcid":"https://orcid.org/0000-0003-3526-3217"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiaoyu Xia","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ibrahim Khalil","orcid":"https://orcid.org/0000-0001-5512-114X"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ibrahim Khalil","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088339847","display_name":"Ziqi Wang","orcid":"https://orcid.org/0000-0002-4485-5583"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ziqi Wang","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021983750","display_name":"Xiuzhen Zhang","orcid":"https://orcid.org/0000-0001-5558-3790"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiuzhen Zhang","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109211237","display_name":"Lin Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Yao","raw_affiliation_strings":["School of Software, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125434169","display_name":"Minhui Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Minhui Xue","raw_affiliation_strings":["CSIRO&#x2019;s Data61 and Responsible AI Research (RAIR) Centre, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO&#x2019;s Data61 and Responsible AI Research (RAIR) Centre, Canberra, Australia","institution_ids":["https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5124931666"],"corresponding_institution_ids":["https://openalex.org/I82951845"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32822673,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"2505","last_page":"2519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.0026000000070780516,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.002300000051036477,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7832000255584717},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7260000109672546},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6086000204086304},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5065000057220459},{"id":"https://openalex.org/keywords/zipfs-law","display_name":"Zipf's law","score":0.453000009059906},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.39579999446868896},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.38350000977516174},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.3743000030517578},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.34459999203681946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8648999929428101},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7832000255584717},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7260000109672546},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6086000204086304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5394999980926514},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5065000057220459},{"id":"https://openalex.org/C125932096","wikidata":"https://www.wikidata.org/wiki/Q205472","display_name":"Zipf's law","level":2,"score":0.453000009059906},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.39579999446868896},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3743000030517578},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3479999899864197},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.34459999203681946},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3246000111103058},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3125},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3075000047683716},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.30000001192092896},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.2897999882698059},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C2987335383","wikidata":"https://www.wikidata.org/wiki/Q878048","display_name":"Cloud server","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C4373008","wikidata":"https://www.wikidata.org/wiki/Q513349","display_name":"File server","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2538999915122986},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3663056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3663056","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1821462560","https://openalex.org/W1972738071","https://openalex.org/W1984778122","https://openalex.org/W2070364554","https://openalex.org/W2112878730","https://openalex.org/W2159587870","https://openalex.org/W2247406977","https://openalex.org/W2474552484","https://openalex.org/W2770249204","https://openalex.org/W2789683759","https://openalex.org/W2891706676","https://openalex.org/W2896743272","https://openalex.org/W2908532574","https://openalex.org/W2951187092","https://openalex.org/W2953901595","https://openalex.org/W2963417042","https://openalex.org/W2971229345","https://openalex.org/W2999743188","https://openalex.org/W3047040155","https://openalex.org/W3047516387","https://openalex.org/W3049290327","https://openalex.org/W3092649369","https://openalex.org/W3093528859","https://openalex.org/W3094082851","https://openalex.org/W3120678039","https://openalex.org/W3126956508","https://openalex.org/W3134185639","https://openalex.org/W3135616226","https://openalex.org/W3175965533","https://openalex.org/W3194231780","https://openalex.org/W3196172277","https://openalex.org/W3198005123","https://openalex.org/W3206276912","https://openalex.org/W4206169166","https://openalex.org/W4224314058","https://openalex.org/W4289656167","https://openalex.org/W4299396283","https://openalex.org/W4302047051","https://openalex.org/W4307056311","https://openalex.org/W4362653871","https://openalex.org/W4381198722","https://openalex.org/W4384284307","https://openalex.org/W4385151819","https://openalex.org/W4387623799","https://openalex.org/W4391953519","https://openalex.org/W4392251645","https://openalex.org/W4392405866","https://openalex.org/W4396757544","https://openalex.org/W4396758695","https://openalex.org/W4399951584","https://openalex.org/W4411337730"],"related_works":[],"abstract_inverted_index":{"Caching":[0],"web":[1,20,172],"data":[2,16,31,55,106,113,132,176],"on":[3,197],"edge":[4,27,82,91,117,171,186],"servers":[5,28,92],"has":[6],"become":[7],"a":[8,102],"common":[9],"practice":[10],"in":[11,74,81,94],"latency-sensitive":[12],"services":[13],"to":[14,37,62,174],"minimize":[15],"retrieval":[17],"delays":[18],"for":[19,53],"users.":[21],"However,":[22],"the":[23,67,112,126,178,203,218],"geographic":[24],"distribution":[25,123,199,220],"of":[26,128,159,185],"and":[29,65,90,130,142,163,167,183],"frequent":[30],"transmissions":[32],"make":[33],"these":[34],"systems":[35],"vulnerable":[36],"security":[38],"threats,":[39],"particularly":[40],"cache":[41],"pollution":[42],"attacks":[43],"(CPAs).":[44],"In":[45,97],"such":[46,201],"attacks,":[47],"malicious":[48],"users":[49,173],"send":[50],"excessive":[51],"requests":[52,86],"unpopular":[54,131],"at":[56],"abnormal":[57],"frequencies,":[58],"causing":[59],"irrelevant":[60],"content":[61],"be":[63],"cached":[64],"degrading":[66],"system\u2019s":[68],"performance.":[69],"Traditional":[70],"CPAs,":[71],"though":[72],"impactful":[73],"conventional":[75],"caching":[76,95,148],"systems,":[77],"are":[78,87],"less":[79],"effective":[80,213],"environments":[83],"where":[84],"user":[85,143,160],"more":[88],"diverse":[89],"collaborate":[93],"strategies.":[96],"this":[98,208],"paper,":[99],"we":[100,210],"identify":[101],"novel":[103],"attack":[104,108,120],"named":[105],"flipping":[107],"(DFA)":[109],"that":[110,195,216],"targets":[111],"transmission":[114],"process":[115],"among":[116],"servers.":[118],"This":[119,145],"manipulates":[121],"request":[122,140,161,219],"by":[124,192,221],"swapping":[125],"frequencies":[127],"popular":[129],"requests,":[133],"all":[134],"while":[135],"maintaining":[136],"other":[137],"characteristics":[138],"like":[139],"timing":[141],"identity.":[144],"tactic":[146],"disrupts":[147],"strategies":[149],"without":[150],"raising":[151],"suspicion.":[152],"Experimental":[153],"results":[154],"indicate":[155],"DFA":[156],"is":[157],"independent":[158],"patterns":[162],"demonstrates":[164],"substantial":[165],"effectiveness":[166],"robustness,":[168],"successfully":[169],"forcing":[170],"retrieve":[175],"from":[177],"cloud":[179],"across":[180],"various":[181],"scales":[182],"configurations":[184],"networks.":[187],"Furthermore,":[188],"it":[189],"evades":[190],"detection":[191],"state-of-the-art":[193],"methods":[194],"rely":[196],"specific":[198],"patterns,":[200],"as":[202],"Zipf":[204],"distribution.":[205],"To":[206],"counter":[207],"attack,":[209],"propose":[211],"an":[212],"defense":[214],"method":[215],"alters":[217],"frequency":[222],"distillation,":[223],"mitigating":[224],"its":[225],"impact.":[226]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-10T00:00:00"}
