{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:17:44Z","timestamp":1762431464883,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/syscon.2018.8369611","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:25:57Z","timestamp":1527805557000},"page":"1-8","source":"Crossref","is-referenced-by-count":20,"title":["Impact of a DDoS attack on computer systems: An approach based on an attack tree model"],"prefix":"10.1109","author":[{"given":"Ronierison","family":"Maciel","sequence":"first","affiliation":[]},{"given":"Jean","family":"Araujo","sequence":"additional","affiliation":[]},{"given":"Jamilson","family":"Dantas","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Melo","sequence":"additional","affiliation":[]},{"given":"Erico","family":"Guedes","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobbs Journal"},{"journal-title":"A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems Via Attack and Protection Trees","year":"2007","author":"edge","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70001-7"},{"key":"ref13","first-page":"6","article-title":"The zombie roundup: Understanding, detecting, and disrupting botnets","volume":"5","author":"cooke","year":"2005","journal-title":"SRUTI"},{"key":"ref14","volume":"30","author":"owasp","year":"2010","journal-title":"&#x201C;10 2010 &#x201D; The Ten Most Critical Web Application Security Risks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4987"},{"journal-title":"Centro de estudos respostas e tratamento de incidentes de seguran&#x00E7;a no brasil","year":"0","author":"cert","key":"ref17"},{"key":"ref18","article-title":"Distributed denial of service attacks: A survey","volume":"3","author":"suhasaria","year":"2017","journal-title":"Imperial Journal of Interdisciplinary Research (IJIR)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302512"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"journal-title":"CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks","year":"1998","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"journal-title":"Large ddos attacks cause outages at twitter spotify and other sites","year":"0","author":"dyn","key":"ref3"},{"journal-title":"CISA Review Manual 2011","year":"2010","author":"isaca","key":"ref6"},{"key":"ref5","first-page":"1","article-title":"Worldwide ddos attacks e cyber insights research report","year":"2017","journal-title":"A Neustar Security Solutions Exclusive"},{"journal-title":"Attack countermeasure trees A non-state-space approach towards analyzing security and finding optimal countermeasure sets","year":"2010","author":"roy","key":"ref8"},{"journal-title":"Internal audit capabilities and needs survey","first-page":"1","year":"2017","key":"ref7"},{"key":"ref2","article-title":"Internet security threat report","volume":"17","author":"wood","year":"2016","journal-title":"Symantec"},{"key":"ref9","first-page":"186","article-title":"Foundations of attack trees","volume":"3935","author":"mauw","year":"2005","journal-title":"ICISC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref20","first-page":"3","author":"ingoldsby","year":"2010","journal-title":"Attack Tree-based Threat Risk Analysis"},{"journal-title":"Threat landscape and good practice guide for internet infrastructure","year":"2015","author":"l\u00e9vy-bencheton","key":"ref22"},{"key":"ref21","article-title":"Attack tree","author":"isograph","year":"2017","journal-title":"Isograph"},{"key":"ref24","first-page":"1","article-title":"Worldwide infrastructure security report","author":"networks","year":"2017","journal-title":"Network Security"},{"journal-title":"Amenaza demos","year":"2010","author":"ingoldsby","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962947"},{"key":"ref25","article-title":"Benefits, risks and recommendations for information security","author":"enisa","year":"2009","journal-title":"European Network and Information Security"}],"event":{"name":"2018 Annual IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2018,4,23]]},"location":"Vancouver, BC","end":{"date-parts":[[2018,4,26]]}},"container-title":["2018 Annual IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8365669\/8369483\/08369611.pdf?arnumber=8369611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:19:30Z","timestamp":1643177970000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8369611\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/syscon.2018.8369611","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}