{"id":"https://openalex.org/W1981395565","doi":"https://doi.org/10.1145/2390317.2390321","title":"Hands-on denial of service lab exercises using SlowLoris and RUDY","display_name":"Hands-on denial of service lab exercises using SlowLoris and RUDY","publication_year":2012,"publication_date":"2012-10-12","ids":{"openalex":"https://openalex.org/W1981395565","doi":"https://doi.org/10.1145/2390317.2390321","mag":"1981395565"},"language":"en","primary_location":{"id":"doi:10.1145/2390317.2390321","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2390317.2390321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2012 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085681605","display_name":"Evan Damon","orcid":null},"institutions":[{"id":"https://openalex.org/I74201987","display_name":"Lewis & Clark College","ror":"https://ror.org/013pz1582","country_code":"US","type":"education","lineage":["https://openalex.org/I74201987"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Evan Damon","raw_affiliation_strings":["Lewis &amp; Clark College, Portland, OR"],"affiliations":[{"raw_affiliation_string":"Lewis &amp; Clark College, Portland, OR","institution_ids":["https://openalex.org/I74201987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112569382","display_name":"Julian Dale","orcid":"https://orcid.org/0000-0001-6466-3426"},"institutions":[{"id":"https://openalex.org/I74201987","display_name":"Lewis & Clark College","ror":"https://ror.org/013pz1582","country_code":"US","type":"education","lineage":["https://openalex.org/I74201987"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Julian Dale","raw_affiliation_strings":["Lewis &amp; Clark College, Portland, OR"],"affiliations":[{"raw_affiliation_string":"Lewis &amp; Clark College, Portland, OR","institution_ids":["https://openalex.org/I74201987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059863180","display_name":"Evaristo Laron","orcid":null},"institutions":[{"id":"https://openalex.org/I74201987","display_name":"Lewis & Clark College","ror":"https://ror.org/013pz1582","country_code":"US","type":"education","lineage":["https://openalex.org/I74201987"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Evaristo Laron","raw_affiliation_strings":["Lewis &amp; Clark College, Portland, OR"],"affiliations":[{"raw_affiliation_string":"Lewis &amp; Clark College, Portland, OR","institution_ids":["https://openalex.org/I74201987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036749753","display_name":"Jens Mache","orcid":"https://orcid.org/0000-0003-2927-7436"},"institutions":[{"id":"https://openalex.org/I74201987","display_name":"Lewis & Clark College","ror":"https://ror.org/013pz1582","country_code":"US","type":"education","lineage":["https://openalex.org/I74201987"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jens Mache","raw_affiliation_strings":["Lewis &amp; Clark College, Portland, OR"],"affiliations":[{"raw_affiliation_string":"Lewis &amp; Clark College, Portland, OR","institution_ids":["https://openalex.org/I74201987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072183744","display_name":"Nathan Land","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nathan Land","raw_affiliation_strings":["Renesys Corp., Hanover, NH"],"affiliations":[{"raw_affiliation_string":"Renesys Corp., Hanover, NH","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009976946","display_name":"Richard Weiss","orcid":"https://orcid.org/0009-0007-6610-5197"},"institutions":[{"id":"https://openalex.org/I60341648","display_name":"The Evergreen State College","ror":"https://ror.org/043yd1m08","country_code":"US","type":"education","lineage":["https://openalex.org/I60341648"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard Weiss","raw_affiliation_strings":["Evergreen State College, Olympia, WA"],"affiliations":[{"raw_affiliation_string":"Evergreen State College, Olympia, WA","institution_ids":["https://openalex.org/I60341648"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085681605"],"corresponding_institution_ids":["https://openalex.org/I74201987"],"apc_list":null,"apc_paid":null,"fwci":1.9588,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.88660324,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8142377138137817},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.7432571649551392},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6726148128509521},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6539204716682434},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5974046587944031},{"id":"https://openalex.org/keywords/denial","display_name":"Denial","score":0.594648003578186},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5838228464126587},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.571409285068512},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5479093790054321},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47206857800483704},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4142155945301056},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23461294174194336},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20422053337097168},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.18156543374061584},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1711178421974182},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15426048636436462},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12649554014205933},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10628455877304077}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8142377138137817},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.7432571649551392},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6726148128509521},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6539204716682434},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5974046587944031},{"id":"https://openalex.org/C2780900520","wikidata":"https://www.wikidata.org/wiki/Q100268981","display_name":"Denial","level":2,"score":0.594648003578186},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5838228464126587},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.571409285068512},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5479093790054321},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47206857800483704},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4142155945301056},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23461294174194336},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20422053337097168},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.18156543374061584},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1711178421974182},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15426048636436462},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12649554014205933},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10628455877304077},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2390317.2390321","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2390317.2390321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2012 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4000413603","display_name":null,"funder_award_id":"DUE-1141341DUE-1141314","funder_id":"https://openalex.org/F4320337408","funder_display_name":"Division of Undergraduate Education"}],"funders":[{"id":"https://openalex.org/F4320337408","display_name":"Division of Undergraduate Education","ror":"https://ror.org/02kd4km72"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W38201321","https://openalex.org/W1984479361","https://openalex.org/W2042608176","https://openalex.org/W2075696462","https://openalex.org/W2117909503","https://openalex.org/W2128158216","https://openalex.org/W2138350171","https://openalex.org/W2228414109"],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W3213194066","https://openalex.org/W4287020359","https://openalex.org/W268355439","https://openalex.org/W2967125893","https://openalex.org/W4385323698","https://openalex.org/W2385362579","https://openalex.org/W2380993274"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3,52],"interactive":[4],"exercise":[5,20,53,109],"based":[6],"on":[7,64],"offensive":[8],"denial":[9,29],"of":[10,18,28,30,67],"service":[11,31],"techniques":[12],"used":[13],"by":[14,76],"hackers.":[15],"The":[16],"goals":[17],"the":[19,77,82,117],"are":[21],"to":[22,43,59,96,104,113],"teach":[23],"how":[24,103],"a":[25,65],"large":[26],"class":[27,66],"(DoS)":[32],"attacks":[33,101],"work.":[34],"Students":[35],"will":[36],"see":[37],"that":[38,54],"it":[39,63,73],"is":[40],"not":[41],"necessary":[42],"use":[44],"distributed":[45],"DoS.":[46],"Moreover,":[47],"using":[48],"virtualization,":[49],"we":[50,85],"created":[51],"was":[55,74],"easy":[56,80],"for":[57,81],"faculty":[58,83],"use.":[60],"We":[61],"tested":[62],"computer":[68],"science":[69],"undergraduates,":[70],"and":[71,79,102],"while":[72],"well-received":[75],"students":[78,98,112],"member,":[84],"learned":[86],"some":[87],"important":[88],"lessons":[89],"about":[90,99],"designing":[91],"hands-on":[92],"exercises.":[93],"In":[94],"addition":[95],"teaching":[97],"DoS":[100],"defend":[105],"against":[106],"them,":[107],"this":[108],"also":[110],"requires":[111],"look":[114],"carefully":[115],"at":[116],"HTTP":[118],"protocol.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
