{"id":"https://openalex.org/W4252019924","doi":"https://doi.org/10.1109/iwqos.2012.6245975","title":"Understanding the impact of Denial of Service attacks on Virtual Machines","display_name":"Understanding the impact of Denial of Service attacks on Virtual Machines","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W4252019924","doi":"https://doi.org/10.1109/iwqos.2012.6245975"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos.2012.6245975","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2012.6245975","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 20th International Workshop on Quality of Service","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051613770","display_name":"Ryan Shea","orcid":"https://orcid.org/0000-0002-8213-2036"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ryan Shea","raw_affiliation_strings":["Simon Fraser University, Burnaby, Canada"],"affiliations":[{"raw_affiliation_string":"Simon Fraser University, Burnaby, Canada","institution_ids":["https://openalex.org/I18014758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039311485","display_name":"Jiangchuan Liu","orcid":"https://orcid.org/0000-0001-6592-1984"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jiangchuan Liu","raw_affiliation_strings":["Simon Fraser University, Burnaby, Canada"],"affiliations":[{"raw_affiliation_string":"Simon Fraser University, Burnaby, Canada","institution_ids":["https://openalex.org/I18014758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051613770"],"corresponding_institution_ids":["https://openalex.org/I18014758"],"apc_list":null,"apc_paid":null,"fwci":6.6807,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.96645378,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.9115995764732361},{"id":"https://openalex.org/keywords/full-virtualization","display_name":"Full virtualization","score":0.8414428234100342},{"id":"https://openalex.org/keywords/application-virtualization","display_name":"Application virtualization","score":0.8168319463729858},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.7908918857574463},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7892268896102905},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7405399084091187},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.7194400429725647},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6769315600395203},{"id":"https://openalex.org/keywords/service-virtualization","display_name":"Service virtualization","score":0.6505643725395203},{"id":"https://openalex.org/keywords/data-virtualization","display_name":"Data virtualization","score":0.5508129000663757},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5485962629318237},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4378732740879059},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36604759097099304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3375060558319092},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11663380265235901}],"concepts":[{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.9115995764732361},{"id":"https://openalex.org/C47878483","wikidata":"https://www.wikidata.org/wiki/Q848333","display_name":"Full virtualization","level":4,"score":0.8414428234100342},{"id":"https://openalex.org/C13062989","wikidata":"https://www.wikidata.org/wiki/Q651531","display_name":"Application virtualization","level":5,"score":0.8168319463729858},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.7908918857574463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7892268896102905},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7405399084091187},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.7194400429725647},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6769315600395203},{"id":"https://openalex.org/C22502294","wikidata":"https://www.wikidata.org/wiki/Q17149844","display_name":"Service virtualization","level":5,"score":0.6505643725395203},{"id":"https://openalex.org/C80344994","wikidata":"https://www.wikidata.org/wiki/Q5227369","display_name":"Data virtualization","level":4,"score":0.5508129000663757},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5485962629318237},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4378732740879059},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36604759097099304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3375060558319092},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11663380265235901}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos.2012.6245975","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2012.6245975","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 20th International Workshop on Quality of Service","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W10141861","https://openalex.org/W204275623","https://openalex.org/W1677315679","https://openalex.org/W1971739358","https://openalex.org/W1972250388","https://openalex.org/W2001968297","https://openalex.org/W2008192747","https://openalex.org/W2012752667","https://openalex.org/W2087853663","https://openalex.org/W2100618668","https://openalex.org/W2130062566","https://openalex.org/W2133508824","https://openalex.org/W2136717145","https://openalex.org/W2140919237","https://openalex.org/W2157821015","https://openalex.org/W2163349370","https://openalex.org/W3000664081","https://openalex.org/W6600400700","https://openalex.org/W6608320993","https://openalex.org/W6652505055","https://openalex.org/W6679442904"],"related_works":["https://openalex.org/W2134071009","https://openalex.org/W633976324","https://openalex.org/W190436017","https://openalex.org/W2021257679","https://openalex.org/W137788609","https://openalex.org/W2189348126","https://openalex.org/W2106040863","https://openalex.org/W2941645671","https://openalex.org/W655266907","https://openalex.org/W3157860010"],"abstract_inverted_index":{"Virtualization,":[0],"which":[1,189],"allows":[2],"multiple":[3],"Virtual":[4],"Machines":[5],"(VMs)":[6],"to":[7,44,62,103,180,200],"reside":[8],"on":[9,79],"a":[10,107,136,177,195],"single":[11],"physical":[12,53],"machine,":[13],"has":[14],"become":[15],"an":[16,76],"indispensable":[17],"technology":[18],"for":[19,29,149],"today's":[20],"IT":[21],"infrastructure.":[22],"It":[23],"is":[24,59,146],"known":[25],"that":[26],"the":[27,80,92,125,155,159,163,173,181,185,192],"overhead":[28,193],"virtualization":[30,65,84,97,169],"affects":[31],"system":[32,66,127],"performance;":[33],"yet":[34],"it":[35],"remains":[36],"largely":[37],"unknown":[38],"whether":[39],"VMs":[40,133],"are":[41],"more":[42],"vulnerable":[43],"networked":[45,64],"Denial":[46],"of":[47,82,95,110,117,132,161,167,194],"Service":[48],"(DoS)":[49],"attacks":[50],"than":[51,140],"conventional":[52],"machines.":[54],"A":[55],"clear":[56],"understanding":[57],"here":[58],"obviously":[60],"critical":[61],"such":[63],"as":[67],"cloud":[68],"computing":[69],"platforms.":[70],"In":[71],"this":[72,145],"paper,":[73],"we":[74,175],"present":[75],"initial":[77],"study":[78],"performance":[81,131],"modern":[83,96,118],"solutions":[85],"under":[86],"DoS":[87,196],"attacks.":[88],"We":[89,152],"experiment":[90],"with":[91,106,121,158],"full":[93],"spectrum":[94],"techniques,":[98],"from":[99],"paravirtualization,":[100],"hardware":[101],"virtualization,":[102,105],"container":[104],"comprehensive":[108],"set":[109],"benchmarks.":[111],"Our":[112],"results":[113],"reveal":[114],"severe":[115],"vulnerability":[116],"virtualization:":[119],"even":[120],"relatively":[122],"light":[123],"attacks,":[124],"file":[126],"and":[128,144,165],"memory":[129],"access":[130],"degrades":[134],"at":[135],"much":[137],"higher":[138],"rate":[139],"their":[141],"non-virtualized":[142],"counterparts,":[143],"particularly":[147],"true":[148],"hypervisor-based":[150],"solutions.":[151],"further":[153],"examine":[154],"root":[156],"causes,":[157],"goal":[160],"enhancing":[162],"robustness":[164],"security":[166],"these":[168],"systems.":[170],"Inspired":[171],"by":[172,198],"findings,":[174],"implement":[176],"practical":[178],"modification":[179],"VirtIO":[182],"drivers":[183],"in":[184],"Linux":[186],"KVM":[187],"package,":[188],"effectively":[190],"mitigates":[191],"attack":[197],"up":[199],"40%.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
