{"id":"https://openalex.org/W2081860290","doi":"https://doi.org/10.1145/1774088.1774234","title":"Mitigating denial of capability attacks using sink tree based quota allocation","display_name":"Mitigating denial of capability attacks using sink tree based quota allocation","publication_year":2010,"publication_date":"2010-03-22","ids":{"openalex":"https://openalex.org/W2081860290","doi":"https://doi.org/10.1145/1774088.1774234","mag":"2081860290"},"language":"en","primary_location":{"id":"doi:10.1145/1774088.1774234","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1774088.1774234","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103659106","display_name":"Zhang Fu","orcid":"https://orcid.org/0009-0001-3190-5246"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Zhang Fu","raw_affiliation_strings":["Chalmers University of Technology","Chalmers University of Technology;"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology","institution_ids":["https://openalex.org/I66862912"]},{"raw_affiliation_string":"Chalmers University of Technology;","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046747104","display_name":"Marina Papatriantafilou","orcid":"https://orcid.org/0000-0001-9094-8871"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marina Papatriantafilou","raw_affiliation_strings":["Chalmers University of Technology","Chalmers University of Technology;"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology","institution_ids":["https://openalex.org/I66862912"]},{"raw_affiliation_string":"Chalmers University of Technology;","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003177344","display_name":"Philippas Tsigas","orcid":"https://orcid.org/0000-0001-9635-9154"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Philippas Tsigas","raw_affiliation_strings":["Chalmers University of Technology","Chalmers University of Technology;"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology","institution_ids":["https://openalex.org/I66862912"]},{"raw_affiliation_string":"Chalmers University of Technology;","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100323630","display_name":"Wei Wei","orcid":"https://orcid.org/0000-0001-5149-6542"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Wei Wei","raw_affiliation_strings":["Norwegian University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103659106"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":1.7806,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85818683,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"713","last_page":"718"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7687186002731323},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7312451004981995},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6353598833084106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5927041172981262},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.586803138256073},{"id":"https://openalex.org/keywords/sink","display_name":"Sink (geography)","score":0.5591934323310852},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.4857828915119171},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.485522985458374},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45176297426223755},{"id":"https://openalex.org/keywords/ticket","display_name":"Ticket","score":0.44866830110549927},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.42569640278816223},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1390126347541809},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1307300627231598}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7687186002731323},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7312451004981995},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6353598833084106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5927041172981262},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.586803138256073},{"id":"https://openalex.org/C143050476","wikidata":"https://www.wikidata.org/wiki/Q194502","display_name":"Sink (geography)","level":2,"score":0.5591934323310852},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.4857828915119171},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.485522985458374},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45176297426223755},{"id":"https://openalex.org/C2776540713","wikidata":"https://www.wikidata.org/wiki/Q7800647","display_name":"Ticket","level":2,"score":0.44866830110549927},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.42569640278816223},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1390126347541809},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1307300627231598},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1774088.1774234","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1774088.1774234","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:research.chalmers.se:106659","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/106659","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1993284846","https://openalex.org/W2030650827","https://openalex.org/W2097883096","https://openalex.org/W2098334439","https://openalex.org/W2112107659","https://openalex.org/W2118878434","https://openalex.org/W2119101903","https://openalex.org/W2129829894","https://openalex.org/W2139854764","https://openalex.org/W4206061315"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2604468458","https://openalex.org/W2157216338","https://openalex.org/W1662107788","https://openalex.org/W121740227","https://openalex.org/W3082379938","https://openalex.org/W2135966669","https://openalex.org/W2594143027","https://openalex.org/W2732769800","https://openalex.org/W2082437045"],"abstract_inverted_index":{"Network":[0],"capabilities":[1],"have":[2],"been":[3],"proposed":[4],"to":[5,55],"prevent":[6],"Distributed":[7],"Denial":[8],"of":[9,116],"Service":[10],"(DDoS)":[11],"attacks":[12],"proactively.":[13],"A":[14],"capability":[15,41,67],"is":[16],"a":[17,24,36,76],"ticket-like":[18],"token,":[19],"checkable":[20],"by":[21],"routers,":[22],"that":[23,98],"server":[25,37],"can":[26,101],"issue":[27],"for":[28,40,65],"legitimate":[29,99],"traffic.":[30],"Still,":[31],"malicious":[32],"hosts":[33,100],"may":[34],"swamp":[35],"with":[38,104],"requests":[39,68],"establishment,":[42],"essentially":[43],"causing":[44],"possible":[45],"Denial-of-Capability":[46],"(DoC).":[47],"In":[48],"this":[49],"paper,":[50],"we":[51],"propose":[52],"an":[53],"algorithm":[54,60],"mitigate":[56],"DoC":[57],"attacks.":[58],"The":[59],"divides":[61],"the":[62,114,117],"server's":[63],"capacity":[64],"handling":[66],"into":[69],"quotas.":[70],"Quotas":[71],"are":[72,84],"allocated":[73],"based":[74],"on":[75,111],"sink":[77],"tree":[78],"architecture.":[79],"Randomization":[80],"and":[81,95,113],"Bloom":[82],"filters":[83],"used":[85],"as":[86],"tools":[87],"against":[88],"threats":[89],"(attacking":[90],"scenarios).":[91],"We":[92,107],"both":[93],"analytically":[94],"experimentally":[96],"show":[97],"get":[102],"service":[103],"guaranteed":[105],"probability.":[106],"also":[108],"address":[109],"issues":[110],"fault-tolerance":[112],"deployment":[115],"approach":[118],"proposed.":[119]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
