{"id":"https://openalex.org/W3179206432","doi":"https://doi.org/10.23919/ifipnetworking52078.2021.9472850","title":"Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS Attacks","display_name":"Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS Attacks","publication_year":2021,"publication_date":"2021-06-21","ids":{"openalex":"https://openalex.org/W3179206432","doi":"https://doi.org/10.23919/ifipnetworking52078.2021.9472850","mag":"3179206432"},"language":"en","primary_location":{"id":"doi:10.23919/ifipnetworking52078.2021.9472850","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ifipnetworking52078.2021.9472850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IFIP Networking Conference (IFIP Networking)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069785997","display_name":"Muriel Figueredo Franco","orcid":"https://orcid.org/0000-0002-0208-0521"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Muriel Franco","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071602128","display_name":"Jan von der Assen","orcid":"https://orcid.org/0000-0002-0591-8887"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Jan von der Assen","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009281919","display_name":"Luc Boillat","orcid":null},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Luc Boillat","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053654122","display_name":"Christian Killer","orcid":"https://orcid.org/0000-0001-7943-1185"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Christian Killer","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003277024","display_name":"Bruno Rodrigues","orcid":"https://orcid.org/0000-0003-3277-3799"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Bruno Rodrigues","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063749335","display_name":"Eder J. Scheid","orcid":"https://orcid.org/0000-0002-7989-5286"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Eder Scheid","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069321002","display_name":"Lisandro Zambenedetti Granville","orcid":"https://orcid.org/0000-0001-8956-8660"},"institutions":[{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Lisandro Granville","raw_affiliation_strings":["Computer Networks Group, Institute of Informatics, Federal University of Rio Grande do Sul UFRGS, Porto Alegre, Brazil"],"affiliations":[{"raw_affiliation_string":"Computer Networks Group, Institute of Informatics, Federal University of Rio Grande do Sul UFRGS, Porto Alegre, Brazil","institution_ids":["https://openalex.org/I130442723"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033030418","display_name":"Burkhard Stiller","orcid":"https://orcid.org/0000-0002-7461-7463"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Burkhard Stiller","raw_affiliation_strings":["Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Communication Systems Group CSG, University of Z\u00fcrich UZH, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5069785997"],"corresponding_institution_ids":["https://openalex.org/I202697423"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58628929,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9239740371704102},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7857613563537598},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.754805326461792},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.6957980394363403},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6813833713531494},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.5855460166931152},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5273612141609192},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49507609009742737},{"id":"https://openalex.org/keywords/flood-myth","display_name":"Flood myth","score":0.48601752519607544},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4135951101779938},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34137749671936035},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28273433446884155},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.23098313808441162},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20553749799728394},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09390023350715637}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9239740371704102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7857613563537598},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.754805326461792},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.6957980394363403},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6813833713531494},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.5855460166931152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5273612141609192},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49507609009742737},{"id":"https://openalex.org/C74256435","wikidata":"https://www.wikidata.org/wiki/Q134052","display_name":"Flood myth","level":2,"score":0.48601752519607544},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4135951101779938},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34137749671936035},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28273433446884155},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.23098313808441162},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20553749799728394},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09390023350715637},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/ifipnetworking52078.2021.9472850","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ifipnetworking52078.2021.9472850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IFIP Networking Conference (IFIP Networking)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2806660753","https://openalex.org/W2901285969","https://openalex.org/W2909880349","https://openalex.org/W2964234547","https://openalex.org/W3009618936","https://openalex.org/W3016340134"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Distributed":[0],"Denial-of-Service":[1],"(DDoS)":[2],"attacks":[3,94],"remain":[4],"one":[5],"of":[6,44,59,67,92,113],"the":[7,22,55,111,114],"top":[8],"reasons":[9],"for":[10,29,54,85],"business":[11],"disruption":[12],"and":[13,38,57,72,89,131],"financial":[14],"losses.":[15],"Although":[16],"mitigation":[17],"solutions":[18],"are":[19],"available":[20],"on":[21],"market,":[23],"there":[24],"is":[25],"still":[26],"a":[27,52,86],"need":[28],"approaches":[30],"that":[31],"help":[32],"network":[33,76],"operators":[34],"understand":[35],"attack":[36,107],"characteristics":[37],"behaviors,":[39],"resulting":[40],"in":[41,95],"better":[42,87],"planning":[43],"companies'":[45],"cybersecurity":[46],"strategies.":[47],"This":[48],"paper":[49],"introduces":[50],"DDoSGrid,":[51],"platform":[53],"analysis":[56,91],"visualization":[58],"DDoS":[60,93,119],"attacks.":[61],"DDoSGrid":[62,116],"implements":[63],"an":[64,104,123],"extensible":[65,128],"set":[66],"miners":[68],"to":[69,81,109],"extract,":[70],"process,":[71],"analyze":[73],"information":[74],"from":[75],"traces":[77],"(i.e.,":[78],"PCAP":[79],"files)":[80],"provide":[82],"insightful":[83,129],"visualizations":[84,130],"understanding":[88],"in-depth":[90],"different":[96],"scenarios.":[97],"A":[98],"case":[99],"study":[100],"was":[101],"performed":[102],"using":[103],"HTTP":[105],"flood":[106],"scenario":[108],"evaluate":[110],"feasibility":[112],"approach.":[115],"enables":[117],"real-world":[118],"scenarios'":[120],"analysis,":[121],"providing":[122],"intuitive":[124],"interface":[125],"integrated":[126],"with":[127],"data":[132],"miners.":[133]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
