{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T13:02:57Z","timestamp":1753275777909,"version":"3.40.5"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/ccst.2019.8888431","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T23:58:31Z","timestamp":1572566311000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["HRF (HTTP Request Filtering): A New Detection Mechanism of EDoS Attack on Cloud"],"prefix":"10.1109","author":[{"given":"B. Basaveswara","family":"Rao","sequence":"first","affiliation":[]},{"given":"Suneetha","family":"Bulla","sequence":"additional","affiliation":[]},{"given":"K. Gangadhara","family":"Rao","sequence":"additional","affiliation":[]},{"given":"K.","family":"Chandan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2006.04.007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2003.1243176"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.01.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2013.6731321"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.146"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948114"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258971"},{"journal-title":"Amazon Auto Scaling Developer Guide","year":"2012","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2010.5678994"},{"journal-title":"AWS WAF Documentation","year":"0","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2012.149"},{"key":"ref27","article-title":"Mitigation of economic distributed denial of sustainability (eddos) in cloud computing","author":"kumar","year":"2011","journal-title":"Proc of the Intl' Conf on Advances in Engineering and Technology"},{"key":"ref29","first-page":"116","article-title":"A new method to mitigate the impacts of the economical denial of sustainability attacks against the cloud","author":"alosaimi","year":"2013","journal-title":"Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication Networking and Broadcasting (PGNet)"},{"article-title":"Timothy Grance: NIST Special Publication 800-145","year":"2011","author":"mell","key":"ref2"},{"article-title":"Timothy Grance: NIST Special Publication 800-144","year":"2011","author":"jansen","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-009-0092-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4036\/iis.2013.173"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"journal-title":"Amazon CloudWatch","year":"2014","key":"ref24"},{"key":"ref23","article-title":"Economic denial of sustainability attack on cloud-a survey","volume":"7","author":"somasundaram","year":"2016","journal-title":"ICTACT JOURNAL on COMMUNICATIon TECHNOLOGY"},{"key":"ref26","first-page":"80","article-title":"Guaranteeing access in spite of distributed service flooding attacks","author":"gligor","year":"2003","journal-title":"International Workshop on Security Protocols"},{"key":"ref25","article-title":"spow: On-demand cloud-based eddos mitigation mechanism","author":"khor","year":"2009","journal-title":"HotDep (Fifth Workshop on Hot Topics in System Dependability)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SVM.2011.6096465"},{"journal-title":"Amazon Elastic Container Service Developer Guide API Version 2014-11-13","year":"0","key":"ref51"},{"key":"ref55","article-title":"Performance measurements and modeling of database servers","author":"kihl","year":"0","journal-title":"Sixth International Workshop on Feedback Control Implementation and Design"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807231"},{"journal-title":"Scaling Your Amazon RDS Instance Vertically and Horizontally","year":"2016","author":"yap","key":"ref53"},{"journal-title":"Amazon EC2 Auto Scaling user guide","year":"0","key":"ref52"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-319-22921-8_18","article-title":"Economic Denial of Sustainability &#x201C;Mitigation in Cloud Computing","author":"ficco","year":"2016","journal-title":"Lecture Notes in Information Systems and Organisation"},{"key":"ref11","article-title":"Abusing public third-party services for edos attacks","author":"wang","year":"2016","journal-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/90.649565"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2013.6731321"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.17"},{"year":"2012","author":"roberts","key":"ref14"},{"journal-title":"The Guardian HSBC suffers Online Banking Cyber Attack","year":"2016","author":"osborne","key":"ref15"},{"journal-title":"Coindesk Bitcoin Gold Website Down Following DDoS Attack","year":"2017","author":"o\u2019leary","key":"ref16"},{"journal-title":"Forbes Bitcoin Hit By Massive DDoS Attack As Tensions Rise","year":"2014","author":"king","key":"ref17"},{"key":"ref18","first-page":"16","article-title":"A survey: Securing cloud infrastructure against edos attack","author":"bhingarkar","year":"2015","journal-title":"Proceedings of the International Conference on Grid Computing and Applications (GCA) The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2016.7835914"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i1.5.9147"},{"key":"ref3","article-title":"DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications","author":"praseed","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref6","article-title":"Evaluating the impact of eDoS attacks to cloud facilities","author":"rossi","year":"2015","journal-title":"VALUETOOLS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-014-1548-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2805907"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S1793962318500496"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-008-9116-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.01.002"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.2"},{"journal-title":"Amazon EC2 pricing","year":"0","key":"ref45"},{"key":"ref48","first-page":"16","article-title":"A survey: Securing cloud infrastructure against edos attack","author":"bhingarkar","year":"2015","journal-title":"Proceedings of the International Conference on Grid Computing and Applications (GCA) The Steering Committee of The World Congress in Computer Science (WorldComp)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2402.2995"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/356733.356737"},{"key":"ref44","article-title":"How a consumer can measure elasticity for cloud platforms","author":"islam","year":"2011","journal-title":"Technical Report School of Information Technology"},{"key":"ref43","article-title":"Cloud Computing: benefits, risks and recommendations for information security","author":"catteddu","year":"2009","journal-title":"European Network and Information Security Agency Technical Report"}],"event":{"name":"2019 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2019,10,1]]},"location":"CHENNAI, India","end":{"date-parts":[[2019,10,3]]}},"container-title":["2019 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8883862\/8888368\/08888431.pdf?arnumber=8888431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:23Z","timestamp":1657854563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ccst.2019.8888431","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}