{"id":"https://openalex.org/W2068460665","doi":"https://doi.org/10.1145/1036921.1036926","title":"Tolerating denial-of-service attacks using overlay networks","display_name":"Tolerating denial-of-service attacks using overlay networks","publication_year":2003,"publication_date":"2003-10-31","ids":{"openalex":"https://openalex.org/W2068460665","doi":"https://doi.org/10.1145/1036921.1036926","mag":"2068460665"},"language":"en","primary_location":{"id":"doi:10.1145/1036921.1036926","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1036921.1036926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083959011","display_name":"Ju Wang","orcid":"https://orcid.org/0000-0001-8026-9787"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ju Wang","raw_affiliation_strings":["University of California, San Diego"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036596371","display_name":"Linyuan L\u00fc","orcid":"https://orcid.org/0000-0003-0155-2002"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Linyuan Lu","raw_affiliation_strings":["University of California, San Diego"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085538238","display_name":"Andrew A. Chien","orcid":"https://orcid.org/0000-0002-1204-206X"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew A. Chien","raw_affiliation_strings":["University of California, San Diego"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083959011"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":4.1118,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.9400525,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"43","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8641698360443115},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.8002822995185852},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.7879144549369812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7836816310882568},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7162765264511108},{"id":"https://openalex.org/keywords/chord","display_name":"Chord (peer-to-peer)","score":0.6329980492591858},{"id":"https://openalex.org/keywords/internet-topology","display_name":"Internet topology","score":0.6243950724601746},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.5880073308944702},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.517616868019104},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5137077569961548},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43924015760421753},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3624503016471863},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3598552346229553},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11168155074119568},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08674311637878418},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07308065891265869}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8641698360443115},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.8002822995185852},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.7879144549369812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7836816310882568},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7162765264511108},{"id":"https://openalex.org/C194147245","wikidata":"https://www.wikidata.org/wiki/Q1076368","display_name":"Chord (peer-to-peer)","level":2,"score":0.6329980492591858},{"id":"https://openalex.org/C99237066","wikidata":"https://www.wikidata.org/wiki/Q17092610","display_name":"Internet topology","level":3,"score":0.6243950724601746},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.5880073308944702},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.517616868019104},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5137077569961548},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43924015760421753},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3624503016471863},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3598552346229553},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11168155074119568},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08674311637878418},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07308065891265869},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1036921.1036926","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1036921.1036926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1505337087","https://openalex.org/W1515707356","https://openalex.org/W1572802054","https://openalex.org/W1578099820","https://openalex.org/W1970950689","https://openalex.org/W1973836644","https://openalex.org/W2020652754","https://openalex.org/W2029673229","https://openalex.org/W2086486316","https://openalex.org/W2088164510","https://openalex.org/W2112643910","https://openalex.org/W2120626294","https://openalex.org/W2123482462","https://openalex.org/W2138621811","https://openalex.org/W2139140682","https://openalex.org/W2139153904","https://openalex.org/W2158049821","https://openalex.org/W2163059190","https://openalex.org/W2167898414","https://openalex.org/W2328187444","https://openalex.org/W2418098342","https://openalex.org/W2487337615","https://openalex.org/W3162991071","https://openalex.org/W4238665603","https://openalex.org/W4246847804","https://openalex.org/W4253641612","https://openalex.org/W6655529318"],"related_works":["https://openalex.org/W89955905","https://openalex.org/W1637847238","https://openalex.org/W2042060105","https://openalex.org/W2126533264","https://openalex.org/W1691715735","https://openalex.org/W2041341978","https://openalex.org/W2122565901","https://openalex.org/W2749656779","https://openalex.org/W4210965064","https://openalex.org/W2134691083"],"abstract_inverted_index":{"Proxy-network":[0],"based":[1],"overlays":[2],"have":[3,88,116],"been":[4,101],"proposed":[5],"to":[6,57],"protect":[7],"Internet":[8],"Applications":[9],"against":[10,42],"Denial-of-Service":[11,85],"attacks":[12,43,58],"by":[13],"hiding":[14],"an":[15],"application's":[16],"location.":[17],"We":[18,30,87],"study":[19,69],"how":[20],"a":[21,70,109,122,129,138],"proxy":[22,38,73,145],"network's":[23],"topology":[24,111,131],"influences":[25],"the":[26],"effectiveness":[27],"of":[28,72,140],"location-hiding.":[29,133,149],"present":[31],"two":[32],"theorems":[33],"which":[34,99],"quantitatively":[35],"characterize":[36],"when":[37,53],"networks":[39,146],"are":[40,55],"robust":[41],"(attackers'":[44,59],"impact":[45,60],"can":[46,127],"be":[47,62,128],"quickly":[48],"and":[49,52,76,83],"completely":[50,63],"removed),":[51],"they":[54],"vulnerable":[56],"cannot":[61],"removed).":[64],"Using":[65],"these":[66],"theorems,":[67],"we":[68,115],"range":[71],"network":[74,93],"topologies,":[75],"identify":[77],"those":[78],"topologies":[79,94],"favorable":[80,110],"for":[81,103,112,132,148],"location-hiding":[82],"resisting":[84],"attacks.":[86],"found":[89],"that":[90,119],"popular":[91,124],"overlay":[92,125],"such":[95,113],"as":[96],"Chord":[97],"[25],":[98],"has":[100],"suggested":[102],"location-hiding,":[104],"is":[105],"in":[106],"fact":[107],"not":[108],"purposes;":[114],"also":[117],"shown":[118],"CAN":[120],"[21],":[121],"less":[123],"network,":[126],"good":[130],"Our":[134],"theoretical":[135],"results":[136],"provide":[137],"set":[139],"sound":[141],"design":[142],"principles":[143],"on":[144],"used":[147]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
