{"id":"https://openalex.org/W2962767501","doi":"https://doi.org/10.1145/3337821.3337856","title":"When Power Oversubscription Meets Traffic Flood Attack","display_name":"When Power Oversubscription Meets Traffic Flood Attack","publication_year":2019,"publication_date":"2019-07-25","ids":{"openalex":"https://openalex.org/W2962767501","doi":"https://doi.org/10.1145/3337821.3337856","mag":"2962767501"},"language":"en","primary_location":{"id":"doi:10.1145/3337821.3337856","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3337821.3337856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 48th International Conference on Parallel Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101191654","display_name":"Xiaofeng Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaofeng Hou","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060364339","display_name":"Mingyu Liang","orcid":"https://orcid.org/0000-0002-8203-2297"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyu Liang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100323131","display_name":"Chao Li","orcid":"https://orcid.org/0000-0001-8571-6531"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Li","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046528137","display_name":"Wenli Zheng","orcid":"https://orcid.org/0000-0002-5010-2326"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenli Zheng","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377856","display_name":"Quan Chen","orcid":"https://orcid.org/0000-0003-2034-0371"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Chen","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039318240","display_name":"Minyi Guo","orcid":"https://orcid.org/0000-0003-0034-2302"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minyi Guo","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101191654"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.3391,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67158798,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7338802814483643},{"id":"https://openalex.org/keywords/power-management","display_name":"Power management","score":0.6558458805084229},{"id":"https://openalex.org/keywords/data-center","display_name":"Data center","score":0.592978298664093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5838196277618408},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.5041252374649048},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.4962003827095032},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.49349868297576904},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4911927878856659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47964149713516235},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4761481285095215},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4560622274875641},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.41542959213256836},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.40360382199287415},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19585737586021423}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7338802814483643},{"id":"https://openalex.org/C2778774385","wikidata":"https://www.wikidata.org/wiki/Q4437810","display_name":"Power management","level":3,"score":0.6558458805084229},{"id":"https://openalex.org/C153740404","wikidata":"https://www.wikidata.org/wiki/Q671224","display_name":"Data center","level":2,"score":0.592978298664093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5838196277618408},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.5041252374649048},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.4962003827095032},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.49349868297576904},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4911927878856659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47964149713516235},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4761481285095215},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4560622274875641},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.41542959213256836},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40360382199287415},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19585737586021423},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3337821.3337856","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3337821.3337856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 48th International Conference on Parallel Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5699999928474426}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322999","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1836367152","https://openalex.org/W1966247431","https://openalex.org/W2006288119","https://openalex.org/W2017204972","https://openalex.org/W2018108780","https://openalex.org/W2018975076","https://openalex.org/W2030810346","https://openalex.org/W2037371820","https://openalex.org/W2037696720","https://openalex.org/W2053400465","https://openalex.org/W2100346277","https://openalex.org/W2118955868","https://openalex.org/W2126345423","https://openalex.org/W2132577610","https://openalex.org/W2140141884","https://openalex.org/W2162334945","https://openalex.org/W2162964261","https://openalex.org/W2164466478","https://openalex.org/W2164954185","https://openalex.org/W2167088175","https://openalex.org/W2170874246","https://openalex.org/W2197538184","https://openalex.org/W2312934231","https://openalex.org/W2478975237","https://openalex.org/W2511844051","https://openalex.org/W2538399305","https://openalex.org/W2540373227","https://openalex.org/W2575437342","https://openalex.org/W2634237701","https://openalex.org/W2738679187","https://openalex.org/W2789271295","https://openalex.org/W2909681043","https://openalex.org/W2999382947","https://openalex.org/W3003699477","https://openalex.org/W3104065274","https://openalex.org/W4249878737","https://openalex.org/W4251091605","https://openalex.org/W6655014866"],"related_works":["https://openalex.org/W2552083296","https://openalex.org/W158894772","https://openalex.org/W2186040286","https://openalex.org/W1587397813","https://openalex.org/W808103542","https://openalex.org/W2080660088","https://openalex.org/W2521982240","https://openalex.org/W3205941417","https://openalex.org/W1519266335","https://openalex.org/W2125988539"],"abstract_inverted_index":{"The":[0,147],"state-of-the-art":[1],"techniques":[2],"on":[3,130,175],"data":[4,24,135],"center":[5,136],"peak":[6],"power":[7,28,38,61,79,93,142,162,173,201,237],"management":[8,143,202],"are":[9,121],"too":[10],"optimistic;":[11],"they":[12],"overestimate":[13],"their":[14],"benefits":[15],"in":[16,23,72],"a":[17,68,140],"potentially":[18],"insecure":[19],"operating":[20,70],"environment.":[21],"Especially":[22],"centers":[25],"that":[26,33,118,215],"oversubscribe":[27],"infrastructure,":[29],"it":[30,165,193],"is":[31,46,152,197],"likely":[32],"unexpected":[34],"traffics":[35,98],"can":[36,76,91],"violate":[37],"budget":[39],"before":[40],"an":[41,89],"effective":[42],"network":[43,83,157,177],"DoS":[44,74],"attack":[45],"observed.":[47],"In":[48,86],"this":[49,87,104],"work,":[50],"we":[51,138,213],"take":[52],"the":[53,57,100,154,176,190,226,235],"first":[54],"to":[55,170,188,199,234],"investigate":[56],"joint":[58],"effect":[59],"of":[60,107,112,150,167,184],"throttling":[62],"and":[63,114,160,181,204],"traffic":[64,84,158],"flooding.":[65],"We":[66,102,116],"characterize":[67],"special":[69],"region":[71],"which":[73],"attacks":[75,174],"provoke":[77],"undesirable":[78],"peaks":[80],"without":[81,126],"exhibiting":[82],"anomalies.":[85],"region,":[88],"attacker":[90],"trigger":[92],"emergency":[94],"by":[95,231],"sending":[96],"normal":[97],"throughout":[99],"Internet.":[101],"term":[103],"new":[105],"type":[106],"threat":[108],"as":[109],"DOPE":[110,125],"(Denial":[111],"Power":[113],"Energy).":[115],"show":[117,214],"existing":[119],"technologies":[120],"insufficient":[122],"for":[123],"eliminating":[124],"negative":[127],"performance":[128,187],"effects":[129],"legitimate":[131],"users.":[132],"To":[133],"enhance":[134],"resiliency,":[137],"propose":[139],"request-aware":[141],"framework":[144],"called":[145],"Anti-DOPE.":[146],"key":[148],"feature":[149],"Anti-DOPE":[151,196,216],"bridging":[153],"gap":[155],"between":[156],"controlling":[159,238],"server":[161],"management.":[163],"Specifically,":[164],"pre-processes":[166],"incoming":[168],"requests":[169],"isolate":[171],"malicious":[172],"load":[178],"balancer":[179],"side":[180],"then":[182],"post-processes":[183],"compute":[185],"node":[186],"minimize":[189],"collateral":[191],"damage":[192],"may":[194],"cause.":[195],"orthogonal":[198],"prior":[200],"schemes":[203],"requires":[205],"minute":[206],"system":[207],"modification.":[208],"Using":[209],"Alibaba":[210],"container":[211],"trace":[212],"allows":[217],"44%":[218],"shorter":[219],"average":[220],"response":[221],"time.":[222],"It":[223],"also":[224],"improves":[225],"90th":[227],"percentile":[228],"tail":[229],"latency":[230],"68.1%":[232],"compared":[233],"other":[236],"methods.":[239]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
