{"id":"https://openalex.org/W2025630825","doi":"https://doi.org/10.4304/jcp.9.6.1426-1435","title":"DDoS: Flood vs. Shrew","display_name":"DDoS: Flood vs. Shrew","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2025630825","doi":"https://doi.org/10.4304/jcp.9.6.1426-1435","mag":"2025630825"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.9.6.1426-1435","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.9.6.1426-1435","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083430909","display_name":"Zhijun Wu","orcid":"https://orcid.org/0000-0002-0691-1767"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhijun Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406295","display_name":"Guang Li","orcid":"https://orcid.org/0000-0002-1253-3985"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guang Li","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011298645","display_name":"Meng Yue","orcid":"https://orcid.org/0000-0002-1473-3729"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meng Yue","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5042353089","display_name":"Hualong Zeng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hualong Zeng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083430909"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3448,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6473253,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shrew","display_name":"Shrew","score":0.7642586827278137},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5405624508857727},{"id":"https://openalex.org/keywords/flood-myth","display_name":"Flood myth","score":0.5281866788864136},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.3697817027568817},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.24588415026664734},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2455795705318451},{"id":"https://openalex.org/keywords/paleontology","display_name":"Paleontology","score":0.10826778411865234},{"id":"https://openalex.org/keywords/archaeology","display_name":"Archaeology","score":0.10185790061950684},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.057814598083496094}],"concepts":[{"id":"https://openalex.org/C2777755905","wikidata":"https://www.wikidata.org/wiki/Q41631","display_name":"Shrew","level":2,"score":0.7642586827278137},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5405624508857727},{"id":"https://openalex.org/C74256435","wikidata":"https://www.wikidata.org/wiki/Q134052","display_name":"Flood myth","level":2,"score":0.5281866788864136},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.3697817027568817},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.24588415026664734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2455795705318451},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.10826778411865234},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.10185790061950684},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.057814598083496094},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jcp.9.6.1426-1435","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.9.6.1426-1435","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2006224151","https://openalex.org/W2107239999","https://openalex.org/W2128599397","https://openalex.org/W2128814339","https://openalex.org/W2142733395","https://openalex.org/W2144266792","https://openalex.org/W2148014295","https://openalex.org/W2333408683","https://openalex.org/W2994517056","https://openalex.org/W6679113141","https://openalex.org/W6681100694"],"related_works":["https://openalex.org/W4312563998","https://openalex.org/W2318363376","https://openalex.org/W2969734341","https://openalex.org/W3085866592","https://openalex.org/W3207548516","https://openalex.org/W2131813103","https://openalex.org/W4253907560","https://openalex.org/W2767440220","https://openalex.org/W2206808355","https://openalex.org/W3215704047"],"abstract_inverted_index":{"Distributed":[0],"Denial":[1],"of":[2,8,17,26,58,78,98],"Service":[3],"(DDoS)":[4],"attack":[5,45],"is":[6,66,91,102],"one":[7],"the":[9,18,62,82,86],"greatest":[10],"threats":[11],"to":[12,60,68,80,93,104],"connectivity,":[13],"continuity,":[14],"and":[15,31,44,89,106],"availability":[16],"Internet.":[19],"In":[20],"this":[21],"paper,":[22],"two":[23],"typical":[24],"types":[25],"DDoS":[27,53,73,108],"attacks,":[28],"high-rate":[29,52],"(Flood)":[30],"low-rate":[32,72],"(Shrew),":[33],"are":[34],"studied":[35],"on":[36],"their":[37],"generation":[38],"principles,":[39],"mechanism":[40],"utilizations,":[41],"behaviors,":[42],"signatures,":[43],"performances.":[46],"Experiment":[47],"results":[48],"show":[49],"that:":[50],"(I)":[51],"sends":[54],"a":[55,75],"large":[56],"amount":[57],"traffic":[59,79],"destroy":[61],"victim":[63,87],"but":[64],"it":[65,90],"easy":[67,92],"be":[69],"detected.":[70],"(II)":[71],"organizes":[74],"small":[76],"quantity":[77],"degrade":[81],"service":[83],"quality":[84],"at":[85],"end":[88],"escape":[94],"from":[95],"detection.":[96],"Comparison":[97],"flood":[99],"with":[100],"shrew":[101],"helpful":[103],"detect":[105],"defend":[107],"attacks":[109],"efficiently.":[110]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
