{"id":"https://openalex.org/W2806660753","doi":"https://doi.org/10.1109/syscon.2018.8369611","title":"Impact of a DDoS attack on computer systems: An approach based on an attack tree model","display_name":"Impact of a DDoS attack on computer systems: An approach based on an attack tree model","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2806660753","doi":"https://doi.org/10.1109/syscon.2018.8369611","mag":"2806660753"},"language":"en","primary_location":{"id":"doi:10.1109/syscon.2018.8369611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon.2018.8369611","pdf_url":null,"source":{"id":"https://openalex.org/S4306498283","display_name":"2018 Annual IEEE International Systems Conference (SysCon)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Annual IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024759600","display_name":"Ronierison Maciel","orcid":"https://orcid.org/0000-0001-5749-6359"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Ronierison Maciel","raw_affiliation_strings":["Informatics Center, Federal University of Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Informatics Center, Federal University of Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038975596","display_name":"Jean Ara\u00fajo","orcid":"https://orcid.org/0000-0002-1688-4782"},"institutions":[{"id":"https://openalex.org/I62921916","display_name":"Universidade Federal Rural de Pernambuco","ror":"https://ror.org/02ksmb993","country_code":"BR","type":"education","lineage":["https://openalex.org/I62921916"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Jean Araujo","raw_affiliation_strings":["Academic Unit of Garanhuns, Federal Rural University of Pernambuco, Garanhuns, Brazil"],"affiliations":[{"raw_affiliation_string":"Academic Unit of Garanhuns, Federal Rural University of Pernambuco, Garanhuns, Brazil","institution_ids":["https://openalex.org/I62921916"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011821071","display_name":"Jamilson Dantas","orcid":"https://orcid.org/0000-0001-9009-7659"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Jamilson Dantas","raw_affiliation_strings":["Informatics Center, Federal University of Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Informatics Center, Federal University of Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101507802","display_name":"Carlos Melo","orcid":"https://orcid.org/0000-0001-5611-4793"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Carlos Melo","raw_affiliation_strings":["Informatics Center, Federal University of Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Informatics Center, Federal University of Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029079672","display_name":"Erico Guedes","orcid":null},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Erico Guedes","raw_affiliation_strings":["Informatics Center, Federal University of Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Informatics Center, Federal University of Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054133174","display_name":"Paulo Maciel","orcid":"https://orcid.org/0000-0003-3159-6065"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Paulo Maciel","raw_affiliation_strings":["Informatics Center, Federal University of Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Informatics Center, Federal University of Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5024759600"],"corresponding_institution_ids":["https://openalex.org/I25112270"],"apc_list":null,"apc_paid":null,"fwci":3.7615,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.9410989,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7647442817687988},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7582918405532837},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7473061084747314},{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.7204441428184509},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5937415361404419},{"id":"https://openalex.org/keywords/maintainability","display_name":"Maintainability","score":0.5440747737884521},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.49392110109329224},{"id":"https://openalex.org/keywords/unavailability","display_name":"Unavailability","score":0.4557189643383026},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.43589988350868225},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.42257654666900635},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4151454269886017},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4120042324066162},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.23021847009658813},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2083885669708252},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1354025900363922}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7647442817687988},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7582918405532837},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7473061084747314},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.7204441428184509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5937415361404419},{"id":"https://openalex.org/C160713754","wikidata":"https://www.wikidata.org/wiki/Q1389965","display_name":"Maintainability","level":2,"score":0.5440747737884521},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.49392110109329224},{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.4557189643383026},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.43589988350868225},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.42257654666900635},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4151454269886017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4120042324066162},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.23021847009658813},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2083885669708252},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1354025900363922},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon.2018.8369611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon.2018.8369611","pdf_url":null,"source":{"id":"https://openalex.org/S4306498283","display_name":"2018 Annual IEEE International Systems Conference (SysCon)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Annual IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W49590930","https://openalex.org/W1499648394","https://openalex.org/W1572380068","https://openalex.org/W1677315679","https://openalex.org/W2027487162","https://openalex.org/W2087092764","https://openalex.org/W2124256985","https://openalex.org/W2136032111","https://openalex.org/W2146024157","https://openalex.org/W2154971967","https://openalex.org/W2159256070","https://openalex.org/W2626578428","https://openalex.org/W4244914852","https://openalex.org/W6630065162","https://openalex.org/W6681293797","https://openalex.org/W6740055676","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W2519114609","https://openalex.org/W2587421370","https://openalex.org/W2891676548","https://openalex.org/W3184570916","https://openalex.org/W1706194612","https://openalex.org/W2051300511","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2204131204","https://openalex.org/W3123917664"],"abstract_inverted_index":{"Attacks":[0],"that":[1,53,133,155],"deny":[2],"access":[3],"to":[4,29,37,40,93,194],"a":[5,31,49,122,146,178,214],"service":[6,77],"provider":[7],"can":[8],"occur":[9,15],"anytime,":[10],"anywhere,":[11],"and":[12,23,69,72,107,141,168,196,201,217],"most":[13],"usually":[14],"with":[16,59],"little":[17],"or":[18],"no":[19],"warning.":[20],"Many":[21],"small":[22],"midsize":[24],"companies":[25],"are":[26,90],"not":[27],"prepared":[28],"handle":[30],"significant":[32],"outage.":[33],"For":[34],"an":[35,41,57,160],"enterprise":[36],"face":[38],"up":[39],"attack":[42,125,148,190,204],"of":[43,54,84,97,104,113,121,137,145,159,171,210],"this":[44],"type,":[45],"it":[46],"must":[47],"possess":[48],"bandwidth":[50],"higher":[51],"than":[52],"the":[55,67,76,82,95,102,114,119,135,143,150,157,165,169,172,189,208,218,224],"attack,":[56,161],"infrastructure":[58],"redundant":[60],"components,":[61],"regular":[62],"backups,":[63],"firewalls":[64],"for":[65,182],"monitoring":[66],"threats":[68,220],"other":[70],"proactive":[71],"reactive":[73],"mechanisms.":[74],"Otherwise,":[75],"will":[78,222],"be":[79],"interrupted,":[80],"increasing":[81],"chances":[83],"financial":[85],"losses.":[86],"Hierarchical":[87],"modeling":[88],"approaches":[89],"often":[91],"used":[92],"evaluate":[94],"availability":[96],"such":[98],"systems,":[99],"thereby":[100],"leveraging":[101],"representation":[103],"multiple":[105],"failure":[106],"repair":[108],"events":[109],"in":[110,126],"distinct":[111],"parts":[112],"system.":[115],"This":[116],"paper":[117],"evaluates":[118],"impact":[120,209],"distributed":[123],"denial-of-service":[124],"computer":[127,215],"systems.":[128,184],"We":[129],"propose":[130],"hierarchical":[131],"models":[132],"represent":[134],"behavior":[136],"major":[138],"system":[139,151,216,225],"components":[140],"assess":[142],"effects":[144],"DDoS":[147],"on":[149,213],"availability.":[152],"The":[153,185,203],"equations":[154],"estimate":[156],"likelihood":[158],"attacker":[162],"benefits,":[163],"feasibility,":[164],"pain":[166],"factor":[167],"propensity":[170],"offense":[173],"were":[174],"present.":[175],"They":[176],"enable":[177],"direct":[179],"analytical":[180],"solution":[181],"large":[183],"results":[186],"obtained":[187],"from":[188],"tree":[191,205],"analysis":[192],"allow":[193],"plan":[195],"improve":[197],"system's":[198],"availability,":[199],"maintainability,":[200],"reliability.":[202],"indices":[206],"show":[207],"simultaneous":[211],"attacks":[212],"several":[219],"which":[221],"maximize":[223],"downtime.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
