{"id":"https://openalex.org/W2155469896","doi":"https://doi.org/10.1145/1966913.1966955","title":"Formal modelling and automatic detection of resource exhaustion attacks","display_name":"Formal modelling and automatic detection of resource exhaustion attacks","publication_year":2011,"publication_date":"2011-03-22","ids":{"openalex":"https://openalex.org/W2155469896","doi":"https://doi.org/10.1145/1966913.1966955","mag":"2155469896"},"language":"en","primary_location":{"id":"doi:10.1145/1966913.1966955","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1966913.1966955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048951454","display_name":"Bogdan Groza","orcid":"https://orcid.org/0000-0003-3078-3635"},"institutions":[{"id":"https://openalex.org/I4210137719","display_name":"Institute e-Austria Timisoara","ror":"https://ror.org/03r6neh61","country_code":"RO","type":"facility","lineage":["https://openalex.org/I4210137719"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Bogdan Groza","raw_affiliation_strings":["Politehnica University and Institute e-Austria, Timi\u015foara, Romania"],"affiliations":[{"raw_affiliation_string":"Politehnica University and Institute e-Austria, Timi\u015foara, Romania","institution_ids":["https://openalex.org/I4210137719"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102793594","display_name":"Marius Minea","orcid":"https://orcid.org/0009-0004-4501-9925"},"institutions":[{"id":"https://openalex.org/I4210137719","display_name":"Institute e-Austria Timisoara","ror":"https://ror.org/03r6neh61","country_code":"RO","type":"facility","lineage":["https://openalex.org/I4210137719"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Marius Minea","raw_affiliation_strings":["Politehnica University and Institute e-Austria, Timi\u015foara, Romania"],"affiliations":[{"raw_affiliation_string":"Politehnica University and Institute e-Austria, Timi\u015foara, Romania","institution_ids":["https://openalex.org/I4210137719"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048951454"],"corresponding_institution_ids":["https://openalex.org/I4210137719"],"apc_list":null,"apc_paid":null,"fwci":2.8006,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91232634,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"326","last_page":"333"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.817610502243042},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8173292875289917},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7454532384872437},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6482058763504028},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.5773040652275085},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5738523602485657},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47959625720977783},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.45811715722084045},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26472631096839905},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.190673828125},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08918923139572144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817610502243042},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8173292875289917},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7454532384872437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6482058763504028},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5773040652275085},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5738523602485657},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47959625720977783},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.45811715722084045},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26472631096839905},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.190673828125},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08918923139572144},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1966913.1966955","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1966913.1966955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5171529375","display_name":null,"funder_award_id":"216471","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338370","display_name":"FP7 Information and Communication Technologies","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W106801528","https://openalex.org/W118842186","https://openalex.org/W405720545","https://openalex.org/W1492996310","https://openalex.org/W1564274994","https://openalex.org/W1601379374","https://openalex.org/W1994386233","https://openalex.org/W1997751406","https://openalex.org/W2019885723","https://openalex.org/W2099817583","https://openalex.org/W2103313298","https://openalex.org/W2130459259","https://openalex.org/W2132544882","https://openalex.org/W2145415641","https://openalex.org/W2154568476","https://openalex.org/W2156954980","https://openalex.org/W2162325770","https://openalex.org/W2163795263","https://openalex.org/W2166327763","https://openalex.org/W2171715320","https://openalex.org/W2616098970","https://openalex.org/W3179399145"],"related_works":["https://openalex.org/W2363179452","https://openalex.org/W2353156531","https://openalex.org/W2372806021","https://openalex.org/W2119614634","https://openalex.org/W2364007254","https://openalex.org/W2350524627","https://openalex.org/W2351593660","https://openalex.org/W2359714759","https://openalex.org/W2350433134","https://openalex.org/W1994311829"],"abstract_inverted_index":{"Many":[0],"common":[1],"protocols:":[2],"TCP,":[3],"IPSec,":[4],"etc.,":[5],"are":[6,96],"vulnerable":[7],"to":[8,23,62,78,127],"denial":[9],"of":[10,19,30,114,130,139],"service":[11],"attacks,":[12],"where":[13],"adversaries":[14],"maliciously":[15],"consume":[16],"significant":[17],"resources":[18],"honest":[20,101],"principals,":[21],"leading":[22,77],"resource":[24,38],"exhaustion.":[25],"We":[26,71,108],"propose":[27],"a":[28,118],"set":[29],"cost-based":[31],"rules":[32,91],"that":[33,59,95],"formalize":[34],"DoS":[35,82,140],"attacks":[36,83,94],"by":[37,98,104],"exhaustion":[39],"and":[40],"can":[41,86,92],"automate":[42],"their":[43],"detection.":[44],"Our":[45,90],"classification":[46],"separates":[47],"excessive":[48],"but":[49],"legal":[50],"protocol":[51,57,69,106,123],"use":[52],"(e.g.,":[53],"flooding)":[54],"from":[55,81],"illegal":[56],"manipulation":[58],"causes":[60],"participants":[61],"waste":[63],"computation":[64],"time":[65],"without":[66],"reaching":[67],"the":[68,99,115,128,134],"goals.":[70],"also":[72],"distinguish":[73],"simple":[74],"intruder":[75],"intervention":[76],"wasteful":[79],"execution":[80],"proper,":[84],"which":[85],"be":[87],"repeatedly":[88],"initiated.":[89],"highlight":[93],"undetectable":[97],"targeted":[100],"agents,":[102],"or":[103],"all":[105],"participants.":[107],"have":[109],"successfully":[110],"tested":[111],"an":[112],"implementation":[113],"methodology":[116],"in":[117,125],"validation":[119],"platform":[120],"on":[121],"relevant":[122],"examples,":[124],"what":[126],"best":[129],"our":[131],"knowledge":[132],"is":[133],"first":[135],"formal":[136],"automated":[137],"analysis":[138],"attacks.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
