{"id":"https://openalex.org/W3093845861","doi":"https://doi.org/10.1109/icccnt49239.2020.9225396","title":"Detection and Prevention Mechanisms for DDoS Attack in Cloud Computing Environment","display_name":"Detection and Prevention Mechanisms for DDoS Attack in Cloud Computing Environment","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093845861","doi":"https://doi.org/10.1109/icccnt49239.2020.9225396","mag":"3093845861"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225396","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225396","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052770934","display_name":"Sirisha Potluri","orcid":"https://orcid.org/0000-0001-9106-9780"},"institutions":[{"id":"https://openalex.org/I4210138731","display_name":"ICFAI Foundation for Higher Education","ror":"https://ror.org/04p3pp808","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210138731"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sirisha Potluri","raw_affiliation_strings":["Faculty of Science and Technology, ICFAI Foundation for Higher Education, Hyderabad, INDIA"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Technology, ICFAI Foundation for Higher Education, Hyderabad, INDIA","institution_ids":["https://openalex.org/I4210138731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006525541","display_name":"Monika Mangla","orcid":"https://orcid.org/0000-0002-1752-7226"},"institutions":[{"id":"https://openalex.org/I2800471911","display_name":"Lokmanya Tilak Municipal General Hospital and Lokmanya Tilak Municipal Medical College","ror":"https://ror.org/03fvp2v86","country_code":"IN","type":"healthcare","lineage":["https://openalex.org/I2800471911"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Monika Mangla","raw_affiliation_strings":["Lokmanya Tilak College of Engg., Navi Mumbai, MH, INDIA"],"affiliations":[{"raw_affiliation_string":"Lokmanya Tilak College of Engg., Navi Mumbai, MH, INDIA","institution_ids":["https://openalex.org/I2800471911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033415643","display_name":"Suneeta Satpathy","orcid":"https://orcid.org/0000-0002-6943-171X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suneeta Satpathy","raw_affiliation_strings":["College of engineering Bhubaneswar, Odisha, INDIA"],"affiliations":[{"raw_affiliation_string":"College of engineering Bhubaneswar, Odisha, INDIA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058396473","display_name":"Sachi Nandan Mohanty","orcid":"https://orcid.org/0000-0002-4939-0797"},"institutions":[{"id":"https://openalex.org/I4210138731","display_name":"ICFAI Foundation for Higher Education","ror":"https://ror.org/04p3pp808","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210138731"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sachi Nandan Mohanty","raw_affiliation_strings":["Faculty of Science and Technology, ICFAI Foundation for Higher Education, Hyderabad, INDIA"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Technology, ICFAI Foundation for Higher Education, Hyderabad, INDIA","institution_ids":["https://openalex.org/I4210138731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052770934"],"corresponding_institution_ids":["https://openalex.org/I4210138731"],"apc_list":null,"apc_paid":null,"fwci":3.3919,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.92913492,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.9312533140182495},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8334547281265259},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7761083841323853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.675104558467865},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5985649824142456},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5612255930900574},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5200252532958984},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.4695751368999481},{"id":"https://openalex.org/keywords/cloud-testing","display_name":"Cloud testing","score":0.41792741417884827},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3248324692249298},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16363301873207092},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10713177919387817},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08471652865409851}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.9312533140182495},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8334547281265259},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7761083841323853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.675104558467865},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5985649824142456},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5612255930900574},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5200252532958984},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.4695751368999481},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.41792741417884827},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3248324692249298},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16363301873207092},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10713177919387817},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08471652865409851}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225396","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225396","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W774302798","https://openalex.org/W1978915475","https://openalex.org/W1996623555","https://openalex.org/W2049421380","https://openalex.org/W2141409867","https://openalex.org/W2197538184","https://openalex.org/W2278953052","https://openalex.org/W2538378363","https://openalex.org/W2564635333","https://openalex.org/W2597101467","https://openalex.org/W2625013748","https://openalex.org/W2734469389","https://openalex.org/W2742744764","https://openalex.org/W2753672491","https://openalex.org/W2765558264","https://openalex.org/W2771368821","https://openalex.org/W2773228868","https://openalex.org/W2785495041","https://openalex.org/W2889181578","https://openalex.org/W2890963803","https://openalex.org/W2980142364","https://openalex.org/W2996089766"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"For":[0],"optimal":[1],"use":[2,53],"of":[3,11,72,111],"cloud":[4,12,15,56,77,100,115],"resources":[5],"and":[6,27,40,48,64,117],"to":[7,34,123],"reduce":[8],"the":[9,14,19,35,44,55,73,89,109,118],"latency":[10],"users,":[13],"computing":[16,57,78,101],"model":[17],"extends":[18],"services":[20],"such":[21],"as":[22,94,96],"networking":[23],"facilities,":[24],"computational":[25],"capabilities":[26],"storage":[28],"facilities":[29],"based":[30],"on":[31,114],"demand.":[32],"Due":[33],"dynamic":[36],"behavior,":[37],"distributed":[38],"paradigm":[39,79],"heterogeneity":[41],"present":[42],"among":[43],"processing":[45],"elements,":[46],"devices":[47],"service":[49],"oriented":[50],"pay":[51],"per":[52],"policies;":[54],"environment":[58],"is":[59,80],"having":[60],"its":[61,92],"availability,":[62],"security":[63],"privacy":[65],"issues.":[66],"Among":[67],"these":[68],"various":[69],"issues":[70,75],"one":[71],"important":[74],"in":[76,86,99],"DDoS":[81,90,112],"attack.":[82],"This":[83],"paper":[84],"put":[85],"plain":[87],"words":[88],"attack,":[91],"detection":[93],"well":[95],"prevention":[97],"mechanisms":[98,121],"environment.":[102],"The":[103],"inclusive":[104],"study":[105],"also":[106],"explains":[107],"about":[108],"effects":[110],"attack":[113],"platform":[116],"related":[119],"defense":[120],"required":[122],"be":[124],"considered.":[125]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
