{"id":"https://openalex.org/W2130075740","doi":"https://doi.org/10.4304/jnw.9.3.604-611","title":"Cross-correlation Based Synchronization Mechanism of LDDoS Attacks","display_name":"Cross-correlation Based Synchronization Mechanism of LDDoS Attacks","publication_year":2014,"publication_date":"2014-03-05","ids":{"openalex":"https://openalex.org/W2130075740","doi":"https://doi.org/10.4304/jnw.9.3.604-611","mag":"2130075740"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.9.3.604-611","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.9.3.604-611","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083430909","display_name":"Zhijun Wu","orcid":"https://orcid.org/0000-0002-0691-1767"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhijun WU","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100756948","display_name":"Yi Cui","orcid":"https://orcid.org/0000-0002-9221-4887"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi CUI","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011298645","display_name":"Meng Yue","orcid":"https://orcid.org/0000-0002-1473-3729"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meng YUE","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333985","display_name":"Lan Ma","orcid":"https://orcid.org/0000-0003-3085-1466"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lan MA","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100364381","display_name":"Lu Wang","orcid":"https://orcid.org/0000-0001-6345-3873"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lu WANG","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083430909"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.17689245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"9","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9238024950027466},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.5737590789794922},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.5497987866401672},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4417082965373993},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3646547198295593},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32330501079559326},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.0826306939125061}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9238024950027466},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.5737590789794922},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.5497987866401672},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4417082965373993},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3646547198295593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32330501079559326},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0826306939125061},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jnw.9.3.604-611","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.9.3.604-611","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W53859244","https://openalex.org/W1508882636","https://openalex.org/W1518702348","https://openalex.org/W1563061804","https://openalex.org/W1574779442","https://openalex.org/W2020957124","https://openalex.org/W2081357650","https://openalex.org/W2113831596","https://openalex.org/W2119227347","https://openalex.org/W2125117759","https://openalex.org/W2128599397","https://openalex.org/W2128814339","https://openalex.org/W2135887833","https://openalex.org/W2138814014","https://openalex.org/W2139869637","https://openalex.org/W2144266792","https://openalex.org/W2155235846","https://openalex.org/W2160966218","https://openalex.org/W2994517056","https://openalex.org/W6602089217","https://openalex.org/W6630417872","https://openalex.org/W6679113141","https://openalex.org/W6680154638","https://openalex.org/W6680293897","https://openalex.org/W6682771447"],"related_works":["https://openalex.org/W2382997850","https://openalex.org/W2390968135","https://openalex.org/W2382213751","https://openalex.org/W2351750670","https://openalex.org/W1597848696","https://openalex.org/W2354715126","https://openalex.org/W2388563748","https://openalex.org/W2375179084","https://openalex.org/W2366646518","https://openalex.org/W1187005531"],"abstract_inverted_index":{"A":[0,58],"success":[1],"Low-rate":[2,16],"Distributed":[3],"Denial":[4,17],"of":[5,11,15,18,36,53,91],"Service":[6,19],"(LDDoS)":[7],"attack":[8,31,56,68,84,89,95,108,120,125,131],"is":[9,61],"composed":[10],"many":[12,128],"single":[13,129],"sources":[14],"(LDoS)":[20],"attacks,":[21],"which":[22,122],"are":[23,96],"well-organized":[24],"in":[25,47,98],"time":[26,42,78],"synchronization":[27,43],"to":[28,63,80,118],"aggregate":[29,70],"the":[30,34,51,55,72,88,106],"flow":[32,45],"at":[33,71],"end":[35,74],"target":[37],"router.":[38],"This":[39],"paper":[40],"addresses":[41],"and":[44,93],"aggregation":[46],"LDDoS":[48,94,107],"attacks":[49],"for":[50],"purpose":[52],"exploring":[54],"performance.":[57],"cross-correlation":[59,116],"algorithm":[60,117],"proposed":[62],"guarantee":[64],"all":[65],"network-wide":[66],"distributed":[67],"pulses":[69],"victim":[73],"with":[75],"a":[76,82],"strict":[77],"limitation":[79],"form":[81],"powerful":[83],"pulse.":[85],"Experiments":[86],"on":[87],"performance":[90,126],"LDoS":[92],"performed":[97],"NS-2":[99],"simulation":[100],"platform.":[101],"Experiment":[102],"results":[103],"show":[104],"that":[105],"effects":[109],"can":[110],"be":[111],"improved":[112],"significantly":[113],"by":[114],"using":[115],"coordinate":[119],"pulses,":[121],"obtain":[123],"better":[124],"than":[127],"dependent":[130],"pulses.":[132]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
