{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:03:55Z","timestamp":1767261835131,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_16","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"263-282","source":"Crossref","is-referenced-by-count":19,"title":["DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud"],"prefix":"10.1007","author":[{"given":"Gaurav","family":"Somani","sequence":"first","affiliation":[]},{"given":"Abhinav","family":"Johri","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Taneja","sequence":"additional","affiliation":[]},{"given":"Utkarsh","family":"Pyne","sequence":"additional","affiliation":[]},{"given":"Manoj Singh","family":"Gaur","sequence":"additional","affiliation":[]},{"given":"Dheeraj","family":"Sanghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Chen, Q., Lin, W., Dou, W., Yu, S.: Cbf: a packet filtering method for ddos attack defense in cloud environment. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 427\u2013434. IEEE (2011)","DOI":"10.1109\/DASC.2011.86"},{"key":"16_CR2","unstructured":"Clemente, L.: Auto scaling on aws: an overview (2013). \n                      http:\/\/www.luigiclemente.com\/scalable-websites-on-aws-an-overview\/"},{"key":"16_CR3","unstructured":"Amazon CloudWatch (2014). \n                      https:\/\/aws.amazon.com\/cloudwatch\/"},{"key":"16_CR4","unstructured":"Dean, D., Stubblefield, A.: Using client puzzles to protect tls. In: USENIX Security Symposium, vol. 42 (2001)"},{"issue":"7","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1016\/j.future.2012.12.011","volume":"29","author":"W Dou","year":"2013","unstructured":"Dou, W., Chen, Q., Chen, J.: A confidence-based filtering method for ddos attack defense in cloud environment. Future Gener. Comput. Syst. 29(7), 1838\u20131850 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"16_CR6","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643\u2013666 (2004)","journal-title":"Comput. Netw."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Du, P., Nakao, A.: Ddos defense as a network service. In: Network Operations and Management Symposium (NOMS), pp. 894\u2013897. IEEE (2010)","DOI":"10.1109\/NOMS.2010.5488345"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Ismail, M.N., et al.: Detecting flooding based doS attack in cloud computing environment using covariance matrix approach. In: ICUIMC, p. 36. ACM (2013)","DOI":"10.1145\/2448556.2448592"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Huang, V.S., Huang, R., Chiang, M.: A ddos mitigation system with multi-stage detection and text-based turing testing in cloud computing. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 655\u2013662. IEEE (2013)","DOI":"10.1109\/WAINA.2013.94"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M., Jacobson, D.: Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 61\u201372. ACM (2011)","DOI":"10.1145\/2046660.2046676"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M., Jacobson, D.: Attribution of fraudulent resource consumption in the cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 99\u2013106. IEEE (2012)","DOI":"10.1109\/CLOUD.2012.23"},{"issue":"2","key":"16_CR12","first-page":"110","volume":"5","author":"N Jeyanthi","year":"2013","unstructured":"Jeyanthi, N., Iyengar, N.C.S.N., Mogan Kumar, P.C., Kannammal, A.: An enhanced entropy approach to detect and prevent ddos in cloud environment. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 5(2), 110\u2013119 (2013)","journal-title":"Int. J. Commun. Netw. Inf. Secur. (IJCNIS)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Jia, Q., Wang, H., Fleck, D., Li, F., Stavrou, A., Powell, W.: Catch me if you can: a cloud-enabled ddos defense. In: 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 264\u2013275. IEEE (2014)","DOI":"10.1109\/DSN.2014.35"},{"key":"16_CR14","unstructured":"Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds (awarded best student paper). In: NSDI, USENIX (2005)"},{"key":"16_CR15","unstructured":"Khor, S.H., Nakao, A.: spow: On-demand cloud-based eddos mitigation mechanism. In: HotDep (2009)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Khor, S.H., Nakao, A.: Daas: Ddos mitigation-as-a-service. In: 11th International Symposium on Applications and the Internet (SAINT), pp. 160\u2013171. IEEE (2011)","DOI":"10.1109\/SAINT.2011.30"},{"key":"16_CR17","unstructured":"Kim, S.H., Kim, J.H.: Method for detecting and preventing a ddos attack using cloud computing, and server, 12 July 2010. US Patent App. 13\/386,516"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Koduru, A., Neelakantam, T., Saira Bhanu, S.M.: Detection of economic denial of sustainability using time spent on a web page in cloud. In: 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 1\u20134, October 2013","DOI":"10.1109\/CCEM.2013.6684433"},{"key":"16_CR19","unstructured":"Kaspersky Labs. Global it security risks survey 2014 distributed denial of service (ddos) attacks (2014). \n                      http:\/\/media.kaspersky.com\/en\/B2B-International-2014-Survey-DDoS-Summary-Report.pdf"},{"key":"16_CR20","unstructured":"Latanicki, J., Massonet, P., Naqvi, S., Rochwerger, B., Villari, M.: Scalable cloud defenses for detection, analysis and mitigation of ddos attacks, In: Future Internet, Assembly, pp. 127\u2013137 (2010)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Mao, M., Li, J., Humphrey, M.: Cloud auto-scaling with deadline and budget constraints. In: 2010 11th IEEE\/ACM International Conference on Grid Computing (GRID), pp. 41\u201348. IEEE (2010)","DOI":"10.1109\/GRID.2010.5697966"},{"key":"16_CR22","unstructured":"Marck, S.J., Lyon, J.A., Smith, R.C.: System and method for mitigating application layer distributed denial of service attacks using human behavior analysis, 31 October 2013. US Patent App. 13\/458,129"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Masood, M., Anwar, Z., Raza, S.A., Hur, M.A.: Edos armor: a cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. In: 2013 16th International Multi Topic Conference (INMIC), pp. 37\u201342, December 2013","DOI":"10.1109\/INMIC.2013.6731321"},{"issue":"2","key":"16_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Robinson, M., Reiher, P.: Alliance formation for ddos defense. In: Proceedings of the 2003 Workshop on New Security Paradigms, pp. 11\u201318. ACM (2003)","DOI":"10.1145\/986655.986658"},{"issue":"3","key":"16_CR26","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1111\/deci.12079","volume":"45","author":"S Mohan","year":"2014","unstructured":"Mohan, S., Alam, F.M., Fowler, J.W., Gopalakrishnan, M., Printezis, A.: Capacity planning and allocation for web-based applications. Decis. Sci. 45(3), 535\u2013567 (2014)","journal-title":"Decis. Sci."},{"issue":"2","key":"16_CR27","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/1132026.1132027","volume":"24","author":"D Moore","year":"2006","unstructured":"Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115\u2013139 (2006)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using graphic turing tests to counter automated ddos attacks against web servers. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 8\u201319. ACM, New York (2003)","DOI":"10.1145\/948109.948114"},{"key":"16_CR29","unstructured":"Munson, L.: Greatfire.org faces daily \n                      \n                        \n                      \n                      $${\\$}$$\n                    30,000 bill from ddos attack (2015). \n                      https:\/\/nakedsecurity.sophos.com\/2015\/03\/20\/greatfire-org-faces-daily-30000-bill-from-ddos-attack\/"},{"key":"16_CR30","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/01449290410001669914","volume":"23","author":"FF-H Nah","year":"2004","unstructured":"Nah, F.F.-H.: A study on tolerable waiting time: how long are web users willing to wait? Behav. Inf. Technol. 23, 153\u2013163 (2004)","journal-title":"Behav. Inf. Technol."},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Naresh Kumar, M., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service. In: Fourth International Conference on CICN, pp. 535\u2013539. IEEE (2012)","DOI":"10.1109\/CICN.2012.149"},{"key":"16_CR32","unstructured":"Nelson, P.: Cybercriminals moving into cloud big time, report says (2015). \n                      http:\/\/www.networkworld.com\/article\/2900125\/malware-cybercrime\/criminals-moving-into-cloud-big-time-says-report.html"},{"key":"16_CR33","unstructured":"Arbor Networks. Understanding the nature of ddos attacks (2014). \n                      http:\/\/www.arbornetworks.com\/asert\/2012\/09\/understanding-the-nature-of-ddos-attacks\/"},{"key":"16_CR34","unstructured":"SPAMfighter News. Survey - with ddos attacks companies lose around 100k\/hr (2015). \n                      http:\/\/www.spamfighter.com\/News-19554-Survey-With-DDoS-Attacks-Companies-Lose-around-100kHr.htm"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Oikonomou, G., Mirkovic, J.: Modeling human behavior for defense against flash-crowd attacks. In: IEEE International Conference on Communications, 2009, ICC 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199191"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv. 39(1) (2007)","DOI":"10.1145\/1216370.1216373"},{"key":"16_CR37","unstructured":"Prolexic (2014). \n                      http:\/\/www.prolexic.com\/"},{"key":"16_CR38","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-54525-2_34","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"B Saini","year":"2014","unstructured":"Saini, B., Somani, G.: Index page based EDoS attacks in infrastructure cloud. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 382\u2013395. Springer, Heidelberg (2014)"},{"key":"16_CR39","unstructured":"Seals, T.: Q1 2015 ddos attacks spike, targeting cloud (2015). \n                      http:\/\/www.infosecurity-magazine.com\/news\/q1-2015-ddos-attacks-spike\/"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield - A two-steps mitigation technique against EDoS attacks in cloud computing. In: UCC, pp. 49\u201356. IEEE Computer Society (2011)","DOI":"10.1109\/UCC.2011.17"},{"issue":"9","key":"16_CR41","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1016\/j.jpdc.2010.05.006","volume":"70","author":"M Stillwell","year":"2010","unstructured":"Stillwell, M., Schanzenbach, D., Vivien, F., Casanova, H.: Resource allocation algorithms for virtualized service hosting platforms. J. Parallel Distrib. Comp. 70(9), 962\u2013974 (2010)","journal-title":"J. Parallel Distrib. Comp."},{"key":"#cr-split#-16_CR42.1","unstructured":"Akamai Technologies. Akamai's state of the internet q4 2013 executive summary vol. 6"},{"key":"#cr-split#-16_CR42.2","unstructured":"(4) (2013).   http:\/\/www.akamai.com\/dl\/akamai\/akamai-soti-q413-exec-summary.pdf"},{"key":"16_CR43","unstructured":"WAPT Load Testing Tool. Response time (2015). \n                      http:\/\/www.loadtestingtool.com\/help\/response-time.shtml"},{"issue":"1","key":"16_CR44","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1925861.1925869","volume":"41","author":"LM Vaquero","year":"2011","unstructured":"Vaquero, L.M., Rodero-Merino, L., Buyya, R.: Dynamically scaling applications in the cloud. SIGCOMM Comp. Comm. Rev. 41(1), 45\u201352 (2011)","journal-title":"SIGCOMM Comp. Comm. Rev."},{"key":"16_CR45","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2014.03.009","volume":"46","author":"H Wang","year":"2014","unstructured":"Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target ddos defense mechanism. Comput. Commun. 46, 10\u201321 (2014)","journal-title":"Comput. Commun."},{"key":"16_CR46","unstructured":"Wang, J., Yang, X., Long, K.: Web ddos detection schemes based on measuring user\u2019s access behavior with large deviation. In: Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, pp. 1\u20135. IEEE (2011)"},{"issue":"9","key":"16_CR47","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/TPDS.2013.181","volume":"25","author":"S Yu","year":"2013","unstructured":"Yu, S., Tian, Y., Guo, S., Wu, D.: Can we beat ddos attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245\u20132254 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Zhao, S., Chen, K., Zheng, W.: Defend against denial of service attack with vmm. In: Eighth International Conference on Grid and Cooperative Computing, 2009, GCC 2009, pp. 91\u201396. IEEE (2009)","DOI":"10.1109\/GCC.2009.14"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:49:33Z","timestamp":1559332173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}