{"id":"https://openalex.org/W4389077340","doi":"https://doi.org/10.23919/cnsm59352.2023.10327886","title":"Deciphering DDoS Attacks Through a Global Lens","display_name":"Deciphering DDoS Attacks Through a Global Lens","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4389077340","doi":"https://doi.org/10.23919/cnsm59352.2023.10327886"},"language":"en","primary_location":{"id":"doi:10.23919/cnsm59352.2023.10327886","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm59352.2023.10327886","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 19th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108881056","display_name":"Jonas Brunner","orcid":null},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Jonas Brunner","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","institution_ids":["https://openalex.org/I202697423"]},{"raw_affiliation_string":"Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003277024","display_name":"Bruno Rodrigues","orcid":"https://orcid.org/0000-0003-3277-3799"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Bruno Rodrigues","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","institution_ids":["https://openalex.org/I202697423"]},{"raw_affiliation_string":"Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041677243","display_name":"Katharina O. E. M\u00fcller","orcid":null},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Katharina O. E. M\u00fcller","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","institution_ids":["https://openalex.org/I202697423"]},{"raw_affiliation_string":"Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059077090","display_name":"Salil S. Kanhere","orcid":"https://orcid.org/0000-0002-1835-3475"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Salil S. Kanhere","raw_affiliation_strings":["UNSW Sydney,Networked Systems and Security Group NetSyS,NSW,Australia,2052"],"affiliations":[{"raw_affiliation_string":"UNSW Sydney,Networked Systems and Security Group NetSyS,NSW,Australia,2052","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033030418","display_name":"Burkhard Stiller","orcid":"https://orcid.org/0000-0002-7461-7463"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Burkhard Stiller","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland","institution_ids":["https://openalex.org/I202697423"]},{"raw_affiliation_string":"Department of Informatics IfI, Communication Systems Group CSG, University of Zurich UZH, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108881056"],"corresponding_institution_ids":["https://openalex.org/I202697423"],"apc_list":null,"apc_paid":null,"fwci":0.1996,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53712669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.926142692565918},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7780683636665344},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7645774483680725},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7273582220077515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6424837112426758},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5280923247337341},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.48063960671424866},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4266061782836914},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16667908430099487},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0787496566772461}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.926142692565918},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7780683636665344},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7645774483680725},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7273582220077515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6424837112426758},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5280923247337341},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.48063960671424866},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4266061782836914},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16667908430099487},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0787496566772461}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/cnsm59352.2023.10327886","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm59352.2023.10327886","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 19th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},{"id":"pmh:doi:10.5167/uzh-255613","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2026961462","https://openalex.org/W2050326248","https://openalex.org/W2066454171","https://openalex.org/W2070775229","https://openalex.org/W2081357650","https://openalex.org/W2087853663","https://openalex.org/W2161630727","https://openalex.org/W2162969618","https://openalex.org/W2898909190","https://openalex.org/W2967739499","https://openalex.org/W2995299720","https://openalex.org/W3080201860","https://openalex.org/W3102059489","https://openalex.org/W4252506956","https://openalex.org/W6638200353","https://openalex.org/W6761750580","https://openalex.org/W6781875042"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W2001331025","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2292210693"],"abstract_inverted_index":{"With":[0],"a":[1,12,54,59,76,82],"rising":[2],"frequency":[3],"and":[4,109],"scale,":[5],"Distributed":[6],"Denial-of-Service":[7],"(DDoS)":[8],"attacks":[9,32],"persist":[10],"as":[11,103],"critical":[13],"cybersecurity":[14],"issue.":[15],"While":[16],"shared":[17],"attack":[18,62,65],"fingerprints":[19,41,66,74],"aid":[20],"many":[21],"intrusion":[22],"detection":[23],"systems":[24],"in":[25],"identifying":[26],"threats,":[27],"their":[28,37],"application":[29],"for":[30,57],"DDoS":[31,61,86],"remains":[33],"limited":[34],"due":[35],"to":[36,80,98],"distinct":[38],"nature.":[39],"However,":[40],"observed":[42],"from":[43,68],"multiple":[44],"locations":[45],"can":[46],"provide":[47],"valuable":[48],"insights.":[49],"This":[50],"paper":[51],"presents":[52],"Reassembler,":[53],"novel":[55,100],"platform":[56],"achieving":[58],"global":[60,83],"analysis":[63],"using":[64],"recorded":[67],"various":[69],"locations.":[70],"Reassembler":[71],"consolidates":[72],"these":[73],"into":[75],"unified":[77],"view":[78],"allowing":[79],"obtain":[81],"overview":[84],"of":[85,106,113],"attacks.":[87],"The":[88],"evaluation,":[89],"conducted":[90],"on":[91],"four":[92],"simulated":[93],"scenarios,":[94],"demonstrates":[95],"Reassembler's":[96],"ability":[97],"extract":[99],"properties,":[101],"such":[102],"the":[104,110],"count":[105],"intermediate":[107],"nodes":[108],"estimated":[111],"percentage":[112],"spoofed":[114],"IPs.":[115]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
