{"id":"https://openalex.org/W2081029799","doi":"https://doi.org/10.1145/1377488.1377489","title":"Mitigating application-level denial of service attacks on Web servers","display_name":"Mitigating application-level denial of service attacks on Web servers","publication_year":2008,"publication_date":"2008-07-01","ids":{"openalex":"https://openalex.org/W2081029799","doi":"https://doi.org/10.1145/1377488.1377489","mag":"2081029799"},"language":"en","primary_location":{"id":"doi:10.1145/1377488.1377489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1377488.1377489","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072108555","display_name":"Mudhakar Srivatsa","orcid":"https://orcid.org/0000-0002-5874-3750"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mudhakar Srivatsa","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown, NY"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown, NY","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102744844","display_name":"Arun Iyengar","orcid":"https://orcid.org/0000-0003-4679-1920"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Arun Iyengar","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown, NY"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown, NY","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102195798","display_name":"Jian Yin","orcid":"https://orcid.org/0009-0000-8511-4784"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jian Yin","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown, NY"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown, NY","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343991","display_name":"Ling Liu","orcid":"https://orcid.org/0000-0002-4138-3082"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ling Liu","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA","Georgia Institute of Technology Atlanta, GA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072108555"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.5989,"has_fulltext":false,"cited_by_count":67,"citation_normalized_percentile":{"value":0.96817984,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2","issue":"3","first_page":"1","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8423800468444824},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7396549582481384},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5825279355049133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5757215023040771},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5286417603492737},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4661940634250641},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3003821074962616},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2990574240684509}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8423800468444824},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7396549582481384},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5825279355049133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5757215023040771},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5286417603492737},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4661940634250641},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3003821074962616},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2990574240684509},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1377488.1377489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1377488.1377489","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W59584387","https://openalex.org/W610004429","https://openalex.org/W629809686","https://openalex.org/W1494407420","https://openalex.org/W1563402047","https://openalex.org/W1675137049","https://openalex.org/W1709767083","https://openalex.org/W1756268276","https://openalex.org/W1784406605","https://openalex.org/W1867219652","https://openalex.org/W1949661937","https://openalex.org/W1967949770","https://openalex.org/W1975439966","https://openalex.org/W1985382559","https://openalex.org/W2030650827","https://openalex.org/W2065167540","https://openalex.org/W2087766914","https://openalex.org/W2092425809","https://openalex.org/W2095738877","https://openalex.org/W2121904442","https://openalex.org/W2129453085","https://openalex.org/W2130327661","https://openalex.org/W2134177285","https://openalex.org/W2144695268","https://openalex.org/W2156639545","https://openalex.org/W2160436229","https://openalex.org/W2169899983","https://openalex.org/W2914982603","https://openalex.org/W3147534920","https://openalex.org/W4250223216","https://openalex.org/W4250493029","https://openalex.org/W4300930169"],"related_works":["https://openalex.org/W4247088668","https://openalex.org/W2205051992","https://openalex.org/W2783826416","https://openalex.org/W2595932470","https://openalex.org/W2076705113","https://openalex.org/W2122094909","https://openalex.org/W2887181770","https://openalex.org/W2732274315","https://openalex.org/W3171545315","https://openalex.org/W2514578026"],"abstract_inverted_index":{"Recently,":[0],"we":[1,85,96,141],"have":[2,33],"seen":[3],"increasing":[4],"numbers":[5],"of":[6,8,53,104,185],"denial":[7],"service":[9,123,136],"(DoS)":[10],"attacks":[11,32,41,59,68,89],"against":[12],"online":[13,110,122],"services":[14],"and":[15,25,47,64,79,195,203,217],"Web":[16],"applications":[17],"either":[18],"for":[19,23],"extortion":[20],"reasons":[21],"or":[22],"impairing":[24],"even":[26],"disabling":[27],"the":[28,36,43,58,102,109,121,130,135,169,186,196,210],"competition.":[29],"These":[30],"DoS":[31,40,88,221],"increasingly":[34],"targeted":[35],"application":[37],"level.":[38],"Application-level":[39],"emulate":[42],"same":[44],"request":[45],"syntax":[46],"network-level":[48],"traffic":[49],"characteristics":[50],"as":[51,74],"those":[52],"legitimate":[54],"clients,":[55],"thereby":[56],"making":[57],"much":[60],"harder":[61],"to":[62,100,125,148,152,168,220],"detect":[63],"counter.":[65],"Moreover,":[66],"such":[67,73],"often":[69],"target":[70],"bottleneck":[71],"resources":[72,151],"disk":[75],"bandwidth,":[76,78],"database":[77],"CPU":[80],"resources.":[81],"In":[82],"this":[83],"article,":[84],"propose":[86],"handling":[87],"by":[90,108,128,159],"using":[91,189],"a":[92,162,173,182],"twofold":[93],"mechanism.":[94],"First,":[95],"perform":[97,142],"admission":[98],"control":[99,113,144,156],"limit":[101],"number":[103,132],"concurrent":[105],"clients":[106,127,147],"served":[107],"service.":[111],"Admission":[112],"is":[114,157,218],"based":[115],"on":[116,133,145,200],"port":[117,131],"hiding":[118,129],"that":[119,175,209],"renders":[120],"invisible":[124],"unauthorized":[126],"which":[134],"accepts":[137],"incoming":[138],"requests.":[139],"Second,":[140],"congestion":[143],"admitted":[146],"allocate":[149],"more":[150],"good":[153],"clients.":[154],"Congestion":[155],"achieved":[158],"adaptively":[160],"setting":[161],"client's":[163,170],"priority":[164],"level":[165],"in":[166,172],"response":[167],"requests":[171],"way":[174],"can":[176],"incorporate":[177],"application-level":[178],"semantics.":[179],"We":[180],"present":[181],"detailed":[183],"evaluation":[184],"proposed":[187,211],"solution":[188,212],"two":[190],"sample":[191],"applications:":[192],"Apache":[193,201],"HTTPD":[194],"TPCW":[197],"benchmark":[198],"(running":[199],"Tomcat":[202],"IBM":[204],"DB2).":[205],"Our":[206],"experiments":[207],"show":[208],"incurs":[213],"low":[214],"performance":[215],"overhead":[216],"resilient":[219],"attacks.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":11},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
