{"id":"https://openalex.org/W2117552630","doi":"https://doi.org/10.1145/1866835.1866849","title":"A new form of DOS attack in a cloud and its avoidance mechanism","display_name":"A new form of DOS attack in a cloud and its avoidance mechanism","publication_year":2010,"publication_date":"2010-10-08","ids":{"openalex":"https://openalex.org/W2117552630","doi":"https://doi.org/10.1145/1866835.1866849","mag":"2117552630"},"language":"en","primary_location":{"id":"doi:10.1145/1866835.1866849","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866835.1866849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM workshop on Cloud computing security workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100668819","display_name":"Huan Liu","orcid":"https://orcid.org/0000-0003-4134-7580"},"institutions":[{"id":"https://openalex.org/I4210099672","display_name":"Accenture (United States)","ror":"https://ror.org/013g16z83","country_code":"US","type":"company","lineage":["https://openalex.org/I4210093804","https://openalex.org/I4210099672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Huan Liu","raw_affiliation_strings":["Accenture Technology Labs, San Jose, CA, USA"],"affiliations":[{"raw_affiliation_string":"Accenture Technology Labs, San Jose, CA, USA","institution_ids":["https://openalex.org/I4210099672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100668819"],"corresponding_institution_ids":["https://openalex.org/I4210099672"],"apc_list":null,"apc_paid":null,"fwci":8.9032,"has_fulltext":false,"cited_by_count":95,"citation_normalized_percentile":{"value":0.98144114,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6326211094856262},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6234220862388611},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6120282411575317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47717419266700745},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1439312994480133},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06088706851005554}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6326211094856262},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6234220862388611},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6120282411575317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47717419266700745},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1439312994480133},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06088706851005554},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1866835.1866849","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866835.1866849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM workshop on Cloud computing security workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1498585374","https://openalex.org/W1512493269","https://openalex.org/W1845092866","https://openalex.org/W1923332504","https://openalex.org/W1951223036","https://openalex.org/W1957503394","https://openalex.org/W1959318606","https://openalex.org/W1967949770","https://openalex.org/W1974965594","https://openalex.org/W2023587099","https://openalex.org/W2061109653","https://openalex.org/W2087766914","https://openalex.org/W2091520151","https://openalex.org/W2096615321","https://openalex.org/W2098289156","https://openalex.org/W2100662739","https://openalex.org/W2119028650","https://openalex.org/W2123016589","https://openalex.org/W2126210439","https://openalex.org/W2130531694","https://openalex.org/W2139684699","https://openalex.org/W2141299790","https://openalex.org/W2143065961","https://openalex.org/W2157614013","https://openalex.org/W2160018466","https://openalex.org/W2161630099","https://openalex.org/W2162071412","https://openalex.org/W2169246522","https://openalex.org/W2370276400","https://openalex.org/W2617270836","https://openalex.org/W4238465620","https://openalex.org/W4250493029","https://openalex.org/W4256524787","https://openalex.org/W6817071158","https://openalex.org/W7051885717"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2802581102"],"abstract_inverted_index":{"Data":[0],"center":[1],"networks":[2],"are":[3],"typically":[4],"grossly":[5],"under-provisioned.":[6],"This":[7],"is":[8,39,67],"not":[9],"a":[10,13,21,24,29,33,80,92,115],"problem":[11,22],"in":[12,23,41,60,91,106,108],"corporate":[14],"data":[15],"center,":[16],"but":[17],"it":[18,70],"could":[19,102],"be":[20,103],"shared":[25],"infrastructure,":[26,44],"such":[27,42,99],"as":[28],"co-location":[30],"facility":[31],"or":[32],"cloud":[34,93,110],"infrastructure.":[35,94,111],"If":[36],"an":[37,43,100],"application":[38,46,66],"deployed":[40],"the":[45,53,65,88],"owners":[47],"need":[48,57],"to":[49,58,62,117],"take":[50],"into":[51],"account":[52],"infrastructure":[54],"limitations.":[55],"They":[56],"build":[59],"counter-measures":[61],"ensure":[63],"that":[64,98],"secure":[68],"and":[69,119],"meets":[71],"its":[72],"performance":[73],"requirements.":[74],"In":[75],"this":[76,121],"paper,":[77],"we":[78],"describe":[79,114],"new":[81,122],"form":[82,123],"of":[83,124],"DOS":[84],"attack,":[85],"which":[86],"exploits":[87],"network":[89],"under-provisioning":[90],"We":[95,112],"have":[96],"verified":[97],"attack":[101],"carried":[104],"out":[105],"practice":[107],"one":[109],"also":[113],"mechanism":[116],"detect":[118],"avoid":[120],"attack.":[125]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":16},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":12},{"year":2013,"cited_by_count":14},{"year":2012,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
