{"id":"https://openalex.org/W2149267176","doi":"https://doi.org/10.1145/1029533.1029551","title":"Safely train security engineers regarding the dangers presented by denial of service attacks","display_name":"Safely train security engineers regarding the dangers presented by denial of service attacks","publication_year":2004,"publication_date":"2004-10-28","ids":{"openalex":"https://openalex.org/W2149267176","doi":"https://doi.org/10.1145/1029533.1029551","mag":"2149267176"},"language":"en","primary_location":{"id":"doi:10.1145/1029533.1029551","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029533.1029551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th conference on Information technology education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035371816","display_name":"Clayton Bolz","orcid":null},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Clayton Bolz","raw_affiliation_strings":["Brigham Young University, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Brigham Young University, Provo, UT","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056054273","display_name":"W. Romney","orcid":null},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"W. Romney","raw_affiliation_strings":["Brigham Young University, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Brigham Young University, Provo, UT","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011159997","display_name":"Brandon L. Rogers","orcid":null},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brandon L. Rogers","raw_affiliation_strings":["Brigham Young University, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Brigham Young University, Provo, UT","institution_ids":["https://openalex.org/I100005738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035371816"],"corresponding_institution_ids":["https://openalex.org/I100005738"],"apc_list":null,"apc_paid":null,"fwci":0.2318,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65389954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"66","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7537937164306641},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7277700901031494},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6408849954605103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6327120065689087},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.6316000819206238},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5231876969337463},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5051377415657043},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4800166189670563},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.47063443064689636},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4464883506298065},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44480380415916443},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.43463027477264404},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.3297469913959503},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30334556102752686},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19416001439094543}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7537937164306641},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7277700901031494},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6408849954605103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6327120065689087},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.6316000819206238},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5231876969337463},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5051377415657043},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4800166189670563},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.47063443064689636},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4464883506298065},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44480380415916443},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43463027477264404},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.3297469913959503},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30334556102752686},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19416001439094543},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1029533.1029551","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029533.1029551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th conference on Information technology education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2189058821"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Witnessing,":[0],"firsthand,":[1],"a":[2,13,74,84,90,115,168,205],"tornado":[3],"in":[4,19,186,275],"action":[5],"is":[6,24,37,42,56,171,227],"something":[7,25],"you":[8,26],"don't":[9],"forget;":[10],"likewise,":[11],"seeing":[12],"Denial":[14,134],"of":[15,59,135,159,234],"Service":[16,136],"attack":[17],"underway":[18],"an":[20,57,172,232],"isolated":[21,223],"lab":[22,194,217,244,261],"setting":[23],"never":[27],"want":[28],"to":[29,48,73,80,97,105,122,178,188,202,214,268],"have":[30],"happen":[31],"within":[32],"your":[33],"real":[34,277],"world.":[35,278],"Seeing":[36],"believing.":[38],"One":[39],"immediate":[40],"reaction":[41],"-":[43],"\"What":[44],"can":[45,155],"I":[46],"do":[47],"keep":[49],"this":[50,129],"from":[51,219],"ever":[52],"taking":[53],"place?\"":[54],"This":[55,193],"example":[58],"IT":[60,229,240],"security":[61,68,176],"education":[62,236],"at":[63,231],"its":[64],"best.":[65],"Train":[66],"future":[67],"engineers":[69,177],"by":[70,110,114,197],"introducing":[71],"them":[72,79],"controlled":[75],"disaster,":[76],"and":[77,147,199,251,271],"inspire":[78],"creatively":[81],"search":[82],"for":[83,175],"solution":[85],"that":[86,127],"will":[87,119],"prevent":[88],"such":[89],"cyber":[91],"attack.":[92],"If":[93],"the":[94,101,181,190,211,216,228,260,276],"Internet":[95],"conduit":[96],"supported":[98],"systems":[99],"or":[100,137],"server":[102],"resources":[103],"needed":[104],"process":[106],"requests":[107,112],"become":[108],"overwhelmed":[109],"invalid":[111],"initiated":[113],"hacker,":[116],"legitimate":[117],"clients":[118],"be":[120],"unable":[121],"access":[123,164],"online":[124],"services.":[125],"Attacks":[126],"utilize":[128],"overload":[130],"technique":[131],"are":[132,144],"called":[133],"DoS":[138,184,206,243,270,273],"attacks.":[139],"Many":[140],"mission":[141],"critical":[142,263],"services":[143],"time":[145,150],"sensitive":[146],"can't":[148,163],"tolerate":[149],"delays.":[151],"Also,":[152],"e-commerce":[153],"sites":[154],"lose":[156],"large":[157],"sums":[158],"revenue":[160],"when":[161],"customers":[162],"their":[165],"system.":[166],"As":[167],"result,":[169],"there":[170],"increasing":[173],"need":[174],"fully":[179],"understand":[180],"concepts":[182],"behind":[183],"attacks":[185,253,274],"order":[187],"initiate":[189],"necessary":[191],"countermeasures.":[192],"was":[195],"created":[196],"undergraduates":[198],"shows":[200],"how":[201,246,266],"successfully":[203],"construct":[204],"lab,":[207],"as":[208,210],"well":[209],"methods":[212],"used":[213,226],"isolate":[215],"environment":[218,225],"external":[220],"networks.":[221],"The":[222,242],"laboratory":[224],"Sandbox":[230],"institution":[233],"higher":[235],"focused":[237],"on":[238,265],"educating":[239],"engineers.":[241],"demonstrates":[245],"TCP":[247],"SYN,":[248],"ICMP":[249],"floods,":[250],"LAND":[252],"exhaust":[254],"system":[255],"and/or":[256],"network":[257],"resources.":[258],"Additionally,":[259],"precipitates":[262],"thought":[264],"best":[267],"mitigate":[269],"Distributed":[272]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
