{"id":"https://openalex.org/W2967677910","doi":"https://doi.org/10.5220/0007835304600467","title":"Exploring DDoS Mechanisms","display_name":"Exploring DDoS Mechanisms","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2967677910","doi":"https://doi.org/10.5220/0007835304600467","mag":"2967677910"},"language":"en","primary_location":{"id":"doi:10.5220/0007835304600467","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007835304600467","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Software Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007835304600467","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066121341","display_name":"Bruno J. Neves","orcid":"https://orcid.org/0000-0002-1309-8743"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bruno Neves","raw_affiliation_strings":["Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110801564","display_name":"F. P. A. Leite","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Filipe Leite","raw_affiliation_strings":["Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113877912","display_name":"Lucas Jorge","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lucas Jorge","raw_affiliation_strings":["Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110632256","display_name":"Rahyan Paiva","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahyan Paiva","raw_affiliation_strings":["Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033600490","display_name":"Juliana Maria Trindade Bezerra","orcid":"https://orcid.org/0000-0001-9840-6217"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juliana Bezerra","raw_affiliation_strings":["Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024084278","display_name":"Vitor Curtis","orcid":"https://orcid.org/0000-0003-4462-3907"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vitor Curtis","raw_affiliation_strings":["Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ITA, S\u00e3o Jos\u00e9 dos Campos and Brazil, --- Select a Country ---","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5066121341"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10953833,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"460","last_page":"467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8723917603492737},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7624346017837524},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7469856142997742},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6137394905090332},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5648850798606873},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5200231075286865},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.48724260926246643},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34393757581710815},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2192051112651825},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1514679193496704},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14179959893226624}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8723917603492737},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7624346017837524},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7469856142997742},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6137394905090332},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5648850798606873},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5200231075286865},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.48724260926246643},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34393757581710815},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2192051112651825},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1514679193496704},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14179959893226624}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0007835304600467","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007835304600467","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Software Technologies","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0007835304600467","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007835304600467","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Software Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W4256682929"],"abstract_inverted_index":{"The":[0],"concern":[1],"about":[2],"cyber":[3,36,109],"security":[4,173],"has":[5,60],"attracted":[6],"attention":[7],"by":[8],"organizations":[9],"and":[10,25,29,48,122,127,138],"public":[11],"services":[12,28],"over":[13],"the":[14,20,52,61,66,74,78,85,93,98,113,129,136,154,157],"last":[15],"few":[16],"years":[17],"due":[18],"to":[19,64,68,152,167],"importance":[21],"of":[22,27,35,51,55,81,87,101,103,115,131,148,156],"confidentiality,":[23],"integrity,":[24],"availability":[26,114],"sensitive":[30],"data.":[31],"Many":[32],"recent":[33],"episodes":[34],"attacks":[37],"causing":[38],"strong":[39],"impact":[40,100,130],"have":[41],"been":[42],"performed":[43],"using":[44,135],"extremely":[45],"simple":[46],"techniques":[47],"taking":[49],"advantage":[50],"hidden":[53],"weaknesses":[54],"current":[56,82],"systems.":[57,174],"This":[58],"article":[59],"main":[62],"purpose":[63],"motivate":[65],"academy":[67],"mitigate":[69],"unexpected":[70],"potential":[71,99,155],"threats":[72],"from":[73,172],"attackers":[75],"perspective,":[76],"exposing":[77],"latent":[79],"weakness":[80],"systems,":[83],"since":[84],"majority":[86],"such":[88],"papers":[89],"focus":[90],"only":[91],"on":[92],"defense":[94],"perspective.":[95],"We":[96],"analyze":[97,128],"Denial":[102],"Service":[104],"(DoS),":[105],"a":[106,116,164],"very":[107],"popular":[108],"attack":[110],"that":[111],"affects":[112],"victim":[117],"server,":[118],"through":[119],"different":[120],"mechanisms":[121],"topologies.":[123],"Specifically,":[124],"we":[125,161],"simulate":[126],"Distributed":[132],"DoS":[133],"(DDoS)":[134],"List":[137],"Binary":[139],"Tree":[140],"topologies":[141],"along":[142],"with":[143],"Continuous":[144],"or":[145],"Pulsating":[146],"stream":[147],"requests.":[149],"In":[150],"order":[151],"improve":[153],"analyzed":[158],"DDoS":[159],"methods,":[160],"also":[162],"introduce":[163],"new":[165],"technique":[166],"protect":[168],"them":[169],"against":[170],"mitigation":[171]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
