{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T05:39:51Z","timestamp":1776231591771,"version":"3.50.1"},"reference-count":144,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Portuguese Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT)\/Minist\u00e9rio da Ci\u00eancia, Tecnologia e Ensino Superior (MCTES) through national funds","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EU funds","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}]},{"name":"FCT\/Programa Operacional Competitividade e Internacionaliza\u00e7\u00e3o (COMPETE)\/Fundo Europeu de Desenvolvimento Regional (FEDER) under project SECURIoTESIGN","award":["POCI-01-0145-FEDER-030657"],"award-info":[{"award-number":["POCI-01-0145-FEDER-030657"]}]},{"DOI":"10.13039\/501100008530","name":"C4-Centro de Compet\u00eancias em Cloud Computing","doi-asserted-by":"publisher","award":["Centro-01-0145-FEDER-000019"],"award-info":[{"award-number":["Centro-01-0145-FEDER-000019"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014717","name":"Programa Operacional Regional do Centro, Centro 2020","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014717","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Brazilian Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior (CAPES) Foundation","doi-asserted-by":"publisher","award":["BEX 9095\/13-6"],"award-info":[{"award-number":["BEX 9095\/13-6"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3191430","type":"journal-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T19:35:54Z","timestamp":1657913754000},"page":"76648-76668","source":"Crossref","is-referenced-by-count":58,"title":["Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7829-9805","authenticated-orcid":false,"given":"Vinicius De Miranda","family":"Rios","sequence":"first","affiliation":[{"name":"Instituto de Educa&#x00E7;&#x00E3;o, Ci&#x00EA;ncia e Tecnologia do Tocantins-IFTO, Palmas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-0666","authenticated-orcid":false,"given":"Pedro R. M.","family":"Inacio","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es e Departamento de Inform&#x00E1;tica, Universidade da Beira Interior, Covilh&#x00E3;, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2578-1803","authenticated-orcid":false,"given":"Damien","family":"Magoni","sequence":"additional","affiliation":[{"name":"LaBRI, CNRS, University of Bordeaux, Talence, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-5001","authenticated-orcid":false,"given":"Mario M.","family":"Freire","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es e Departamento de Inform&#x00E1;tica, Universidade da Beira Interior, Covilh&#x00E3;, Portugal"}]}],"member":"263","reference":[{"key":"ref39","first-page":"2285","article-title":"Low-high burst: A double potency varying-RTT based full-buffer shrew attack model","volume":"18","author":"yue","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2596278"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.07.065"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.04.007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102879"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255115"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883403"},{"key":"ref35","first-page":"1","article-title":"On a new class of pulsing denial-of-service attacks and the defense","author":"luo","year":"2005","journal-title":"Proc Netw Distrib Syst Symp"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/863965.863966"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s21093025"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976609"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2021.01.036"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3448291"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3085315"},{"key":"ref23","first-page":"1","article-title":"Secure-MQTT: An efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for Internet of Things","volume":"2019","year":"2019","journal-title":"EURASIP J Wireless Commun Netw"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106997"},{"key":"ref100","first-page":"227","article-title":"Pulsing RoQ DDoS attack and defense scheme in mobile ad hoc networks","volume":"4","author":"ren","year":"2007","journal-title":"Int J Netw Secur"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02763-9"},{"key":"ref50","year":"2012","journal-title":"Are You Ready for Slow Reading"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.17781\/P001550"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.004"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.07.002"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.009"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.007"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19713-5_22"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.72"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2018.00023"},{"key":"ref52","first-page":"350","article-title":"Analysis of slow read dos attack and communication environment","author":"tayama","year":"2017","journal-title":"Proc Int Conf Mobile Wireless Technol"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2010.514651"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.04.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref49","year":"2018","journal-title":"Cloudfare"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01854-6_55"},{"key":"ref45","year":"2015","journal-title":"slowhttptest"},{"key":"ref48","first-page":"288","article-title":"Rudy attack: Detection at the network level and its important features","author":"najafabadi","year":"2016","journal-title":"Proc FLAIRS Conf"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.05.005"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.10.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897866"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.015"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00050"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00100"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00031"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3102046"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2783"},{"key":"ref72","first-page":"284","article-title":"A MAC layer based defense architecture for reduction of quality (RoQ) attacks in wireless LAN","volume":"7","author":"singh","year":"2010","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref129","year":"2008","journal-title":"PyLoris A Testing Tool for Web Server DoS Vulnerabilites"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2677855.2677924"},{"key":"ref128","year":"2018","journal-title":"Slowloris Http Dos"},{"key":"ref70","first-page":"620","article-title":"Simulation and analysis of distributed low-rate denial-of-service attacks","author":"hu","year":"2010","journal-title":"Proc 5th Int Conf Comput Sci Converg Inf Technol"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2993"},{"key":"ref130","year":"2009","journal-title":"How to Help Take Down Gerdab IR in 5 Easy Steps"},{"key":"ref77","first-page":"66","article-title":"A new network flow grouping method for preventing periodic shrew DDoS attacks in cloud computing","author":"liu","year":"2016","journal-title":"Proc 18th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.017"},{"key":"ref133","year":"2012","journal-title":"Torshammer"},{"key":"ref134","year":"2014","journal-title":"Goloris&#x2014;Slowloris for NGINX DoS"},{"key":"ref131","year":"2009","journal-title":"Apache HTTP DoS Tool Released"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1504\/IJAACS.2016.075391"},{"key":"ref132","year":"2018","journal-title":"HTTP Bog A Slow HTTP Denial-of-Service Tool"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6705347"},{"key":"ref136","year":"2016","journal-title":"R-u-dead Yet"},{"key":"ref135","author":"yaltirakli","year":"2015","journal-title":"Slowloris"},{"key":"ref138","year":"2018","journal-title":"SLOWW"},{"key":"ref137","year":"2018","journal-title":"Cyphon"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024719"},{"key":"ref139","year":"2018","journal-title":"Dotloris"},{"key":"ref62","first-page":"196","article-title":"Defending against low-rate TCP attacks: Dynamic detection and protection","author":"sun","year":"2004","journal-title":"Proc 12th IEEE Int Conf Netw Protocols"},{"key":"ref61","first-page":"345","article-title":"Defense against low-rate TCP-targeted denial-of-service attacks","author":"yang","year":"2004","journal-title":"Proc 9th Int Symp Comput Commun"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/11534310_46"},{"key":"ref64","first-page":"1","article-title":"Filtering of shrew DDoS attacks in frequency domain","author":"chen","year":"2005","journal-title":"Proc IEEE Conf Local Comput Netw 30th Anniversary (LCN)"},{"key":"ref140","year":"2018","journal-title":"Pwnloris An Improved Slowloris DoS Tool"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.1413635"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/CHILECON.2017.8229519"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2005.1523867"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912114"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1002\/sec.7"},{"key":"ref143","year":"2009","journal-title":"Apache and Squid DoS"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.38"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3209-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.05.091407"},{"key":"ref1","year":"2001","journal-title":"The Changing Face of Distributed Denial of Service Mitigation"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754984"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2012.6246912"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00100"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICMT.2011.6003045"},{"key":"ref107","first-page":"1","article-title":"Detection of reduction-of-quality DDoS attacks using fuzzy logic and machine learning algorithms","volume":"186","author":"de miranda rios","year":"2021","journal-title":"Comput Netw"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2014.6897151"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6036-3"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126053"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA\/IUCC.2017.00073"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1715514"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911829"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09580-7"},{"key":"ref103","first-page":"4074","article-title":"Mitigating RoQ attacks using flow monitoring method","volume":"4","author":"gulati","year":"2013","journal-title":"Int J Eng Trends Technol"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.204"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249476"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2015.60"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.21"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.110"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.02.038"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.003"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443807"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(11)60458-5"},{"key":"ref11","first-page":"1195","article-title":"Research and survey of low-rate denial of service attacks","author":"zhu","year":"2011","journal-title":"Proc 13th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/863965.863966"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICMT.2011.6002141"},{"key":"ref15","year":"2001","journal-title":"New Breed of Attack Zombies Lurk"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/256821"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980227"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2018.8429980"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2016.7528307"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2012.6510186"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635701"},{"key":"ref18","year":"2012","journal-title":"Taxonomy of Slow DoS Attacks to Web Applications"},{"key":"ref84","first-page":"363","article-title":"Detection of LDoS attacks using variant of CUSUM and Shiryaev&#x2014;Roberts&#x2019;s algorithm","author":"kaur","year":"2016","journal-title":"Proc 4th Int Conf Parallel Distrib Grid Comput (PDGC)"},{"key":"ref119","first-page":"282","article-title":"Rudy attack: Detection at the network level and its important features","author":"najafabadi","year":"2016","journal-title":"Proc 29th Int Flairs Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/IJTMCC.2013.056440"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT51234.2021.9371008"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2016.58"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357467"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/info11120544"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"3823e","DOI":"10.1002\/dac.3823","article-title":"Fast and lightweight detection and filtering method for low-rate TCP targeted distributed denial of service (LDDoS) attacks","volume":"31","author":"?im?ek","year":"2018","journal-title":"Int J Commun Syst"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.09.004"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761806"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2805"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013585"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019330"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS50536.2020.9310040"},{"key":"ref85","year":"2007","journal-title":"Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing"},{"key":"ref86","first-page":"1","article-title":"Detection of low-rate attacks in computer networks","author":"thatte","year":"2008","journal-title":"Proc IEEE InfoCom"},{"key":"ref87","article-title":"Spectral analysis of bottleneck traffic","author":"he","year":"2005"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.5120\/2439-3285"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09830749.pdf?arnumber=9830749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:04:06Z","timestamp":1661198646000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9830749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":144,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3191430","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}