{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:19:05Z","timestamp":1753273145538},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_22","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"373-391","source":"Crossref","is-referenced-by-count":4,"title":["Attribution of Economic Denial of Sustainability Attacks in Public Clouds"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Karami","sequence":"first","affiliation":[]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"22_CR1","unstructured":"Alexa. http:\/\/www.alexa.com\/"},{"key":"22_CR2","unstructured":"Http archive. http:\/\/httparchive.org\/interesting.php?a=All&l=Jan%2015%202016"},{"key":"22_CR3","unstructured":"Amazon ec2 pricing (2016). https:\/\/aws.amazon.com\/ec2\/pricing\/"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Alomari, E., Manickam, S., Gupta, B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv preprint arXiv:1208.0403 (2012)","DOI":"10.5120\/7640-0724"},{"issue":"4","key":"22_CR5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"22_CR6","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.procs.2012.06.056","volume":"10","author":"H Beitollahi","year":"2012","unstructured":"Beitollahi, H., Deconinck, G.: Tackling application-layer DDoS attacks. Procedia Comput. Sci. 10, 432\u2013441 (2012)","journal-title":"Procedia Comput. Sci."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D.: How good are humans at solving captchas? A large scale evaluation. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 399\u2013413. IEEE (2010)","DOI":"10.1109\/SP.2010.31"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based captcha strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 125\u2013138. ACM (2011)","DOI":"10.1145\/2046707.2046724"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14527-8_1"},{"key":"22_CR10","unstructured":"Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T.J., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Proceedings of the 14th Annual Workshop on the Economics of Information Security (2015), Netherlands, June 22\u201323 (2015)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M.: Exploiting cloud utility models for profit and ruin. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 33\u201340. IEEE (2011)","DOI":"10.1109\/CLOUD.2011.45"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M., Jacobson, D.: Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 61\u201372. ACM (2011)","DOI":"10.1145\/2046660.2046676"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M., Jacobson, D.: Attribution of fraudulent resource consumption in the cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 99\u2013106. IEEE (2012)","DOI":"10.1109\/CLOUD.2012.23"},{"key":"22_CR14","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MITP.2012.43","volume":"2","author":"J Idziorek","year":"2013","unstructured":"Idziorek, J., Tannian, M.F., Jacobson, D.: The insecurity of cloud utility models. IT Prof. 2, 22\u201327 (2013)","journal-title":"IT Prof."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: Proceedings of the 11th International Conference on World Wide Web, pp. 293\u2013304. ACM (2002)","DOI":"10.1145\/511446.511485"},{"key":"22_CR16","unstructured":"Karami, M., McCoy, D.: Understanding the emerging threat of DDoS-as-a-service. In: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (2013)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Karami, M., Park, Y., McCoy, D.: Stress testing the booters: understanding and undermining the business of DDoS services. In: Proceedings of the World Wide Web Conference (WWW) (2016)","DOI":"10.1145\/2872427.2883004"},{"key":"22_CR18","unstructured":"Khor, S.H., Nakao, A.: sPoW: on-demand cloud-based eDDOS mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009)"},{"key":"22_CR19","first-page":"995","volume-title":"Machine Learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning, vol. 45, p. 995. McGraw-Hill, Burr Ridge (1997)"},{"key":"22_CR20","unstructured":"Motoyama, M., Levchenko, K., Kanich, C., McCoy, D., Voelker, G.M., Savage, S.: Re: Captchas-understanding captcha-solving services in an economic context. In: USENIX Security Symposium, vol. 10, p. 3 (2010)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Naresh Kumar, M., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, K., Kumar, M.: Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 535\u2013539. IEEE (2012)","DOI":"10.1109\/CICN.2012.149"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Oikonomou, G., Mirkovic, J.: Modeling human behavior for defense against flash-crowd attacks. In: IEEE International Conference on Communications, ICC 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199191"},{"issue":"9","key":"22_CR23","doi-asserted-by":"crossref","first-page":"2263","DOI":"10.1016\/j.jss.2012.12.025","volume":"86","author":"MD Ryan","year":"2013","unstructured":"Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263\u20132268 (2013)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"22_CR24","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.ijcip.2013.01.002","volume":"6","author":"AK Sood","year":"2013","unstructured":"Sood, A.K., Enbody, R.J.: Crimeware-as-a-service\u2014a survey of commoditized crimeware in the underground market. Int. J. Crit. Infrastruct. Prot. 6(1), 28\u201338 (2013)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Sqalli, M.H., Al-Haidari, F., Salah, K.: Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49\u201356. IEEE (2011)","DOI":"10.1109\/UCC.2011.17"},{"issue":"1","key":"22_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"22_CR27","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"6","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 6, 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR28","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-0-387-72367-9_20","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"VL Thing","year":"2007","unstructured":"Thing, V.L., Sloman, M., Dulay, N.: A Survey of Bots Used for Distributed Denial of Service Attacks. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.) SEC 2007. IFIP, vol. 232, pp. 229\u2013240. Springer, Boston, MA (2007). doi: 10.1007\/978-0-387-72367-9_20"},{"key":"22_CR29","unstructured":"Wang, H., Xi, Z., Li, F., Chen, S.: Abusing public third-party services for EDoS attacks. In: 10th USENIX Workshop on Offensive Technologies (WOOT 2016) (2016)"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: Cald: surviving various application-layer DDoS attacks that mimic flash crowd. In: 2010 4th International Conference on Network and System Security (NSS), pp. 247\u2013254. IEEE (2010)","DOI":"10.1109\/NSS.2010.69"},{"issue":"2","key":"22_CR31","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.artint.2009.11.011","volume":"174","author":"S-Z Yu","year":"2010","unstructured":"Yu, S.-Z.: Hidden semi-Markov models. Artif. Intell. 174(2), 215\u2013243 (2010)","journal-title":"Artif. Intell."},{"issue":"1","key":"22_CR32","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/LSP.2002.806705","volume":"10","author":"S-Z Yu","year":"2003","unstructured":"Yu, S.-Z., Kobayashi, H.: An efficient forward-backward algorithm for an explicit-duration hidden Markov model. IEEE Sig. Process. Lett. 10(1), 11\u201314 (2003)","journal-title":"IEEE Sig. Process. Lett."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T01:02:04Z","timestamp":1569459724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}