{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:14:19Z","timestamp":1767183259481,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,8]],"date-time":"2010-10-08T00:00:00Z","timestamp":1286496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,8]]},"DOI":"10.1145\/1866835.1866849","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T15:38:31Z","timestamp":1286897911000},"page":"65-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["A new form of DOS attack in a cloud and its avoidance mechanism"],"prefix":"10.1145","author":[{"given":"Huan","family":"Liu","sequence":"first","affiliation":[{"name":"Accenture Technology Labs, San Jose, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_1_2_1","volume-title":"Performance Evaluation","author":"Carter R. L.","year":"1996","unstructured":"]] Carter , R. L. , and Crovella , M. E . Measuring bottleneck link speed in packet-switched networks. Tech. rep ., Performance Evaluation , 1996 . ]]Carter, R. L., and Crovella, M. E. Measuring bottleneck link speed in packet-switched networks. Tech. rep., Performance Evaluation, 1996."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.05.047"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916282"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592577"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402968"},{"key":"e_1_3_2_1_8_1","volume-title":"Nov.","author":"Hopps C.","year":"2000","unstructured":"]] Hopps , C. Analysis of an Equal-Cost Multi-Path Algorithm. RFC 2992 (Informational) , Nov. 2000 . ]]Hopps, C. Analysis of an Equal-Cost Multi-Path Algorithm. RFC 2992 (Informational), Nov. 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015474"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. IEEE Infocom","author":"Hu N.","year":"2005","unstructured":"]] Hu , N. , Li , L. E. , Mao , Z. M. , Steenkiste , P. , and Wang , J . A measurement study of internet bottlenecks . In Proc. IEEE Infocom ( 2005 ). ]]Hu, N., Li, L. E., Mao, Z. M., Steenkiste, P., and Wang, J. A measurement study of internet bottlenecks. In Proc. IEEE Infocom (2005)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.814505"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815304"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948210"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. NSDI","author":"Kandula S.","year":"2005","unstructured":"]] Kandula , S. , Katabi , D. , Jacob , M. , and Berger , A . Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds . In Proc. NSDI ( 2005 ). ]]Kandula, S., Katabi, D., Jacob, M., and Berger, A. Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds. In Proc. NSDI (2005)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/115992.115995"},{"key":"e_1_3_2_1_16_1","unstructured":"]]U.s. eyes n. korea for 'massive' cyber attacks. http:\/\/www.msnbc.msn.com\/id\/31789294.  ]]U.s. eyes n. korea for 'massive' cyber attacks. http:\/\/www.msnbc.msn.com\/id\/31789294."},{"key":"e_1_3_2_1_17_1","volume-title":"USITS'01: Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems","author":"Lai K.","year":"2001","unstructured":"]] Lai , K. , and Baker , M . Nettimer: a tool for measuring bottleneck link, bandwidth . In USITS'01: Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems ( Berkeley, CA, USA , 2001 ), USENIX Association, pp. 11--11. ]]Lai, K., and Baker, M. Nettimer: a tool for measuring bottleneck link, bandwidth. In USITS'01: Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems (Berkeley, CA, USA, 2001), USENIX Association, pp. 11--11."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPT.2008.020466"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2000.892039"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592575"},{"key":"e_1_3_2_1_21_1","unstructured":"]]Netperf. http:\/\/www.netperf.org\/netperf\/.  ]]Netperf. http:\/\/www.netperf.org\/netperf\/."},{"key":"e_1_3_2_1_22_1","unstructured":"]]Cisco data center infrastructure 2.5 design guide. http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/solution\/dcidg21.pdf.  ]]Cisco data center infrastructure 2.5 design guide. http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/solution\/dcidg21.pdf."},{"key":"e_1_3_2_1_23_1","unstructured":"]]Poisson traffic generator. http:\/\/www.spin.rice.edu\/Software\/poisson_gen\/.  ]]Poisson traffic generator. http:\/\/www.spin.rice.edu\/Software\/poisson_gen\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1248658"},{"key":"e_1_3_2_1_25_1","unstructured":"]]Rackspace ipo will fund new data centers. http:\/\/www.datacenterknowledge.com\/archives\/2008\/04\/29\/rackspace-ipo-will-fund-new-data-centers.  ]]Rackspace ipo will fund new data centers. http:\/\/www.datacenterknowledge.com\/archives\/2008\/04\/29\/rackspace-ipo-will-fund-new-data-centers."},{"key":"e_1_3_2_1_26_1","first-page":"15","volume-title":"Proc. ITC Specialist Seminar on IP Trac Measurement, Modeling, and Management","author":"Ribeiro V.","year":"2000","unstructured":"]] Ribeiro , V. , Coates , M. , Riedi , R. , Sarvotham , S. , Hendricks , B. , and Baraniuk , R . Multifractal cross-traffic estimation . In Proc. ITC Specialist Seminar on IP Trac Measurement, Modeling, and Management ( 2000 ), pp. 15 -- 11 . ]]Ribeiro, V., Coates, M., Riedi, R., Sarvotham, S., Hendricks, B., and Baraniuk, R. Multifractal cross-traffic estimation. In Proc. ITC Specialist Seminar on IP Trac Measurement, Modeling, and Management (2000), pp. 15--1."},{"key":"e_1_3_2_1_27_1","volume-title":"Passive and Active Measurement Workshop","author":"Ribeiro V. J.","year":"2003","unstructured":"]] Ribeiro , V. J. , Riedi , R. H. , Baraniuk , R. G. , Navratil , J. , and Cottrell , L . Pathchirp: Efficient available bandwidth estimation for network paths . In Passive and Active Measurement Workshop ( La Jolla, CA , Apr. 2003 ). ]]Ribeiro, V. J., Riedi, R. H., Baraniuk, R. G., Navratil, J., and Cottrell, L. Pathchirp: Efficient available bandwidth estimation for network paths. In Passive and Active Measurement Workshop (La Jolla, CA, Apr. 2003)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.15"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. USENIX Security","author":"Staniford S.","year":"2002","unstructured":"]] Staniford , S. , Paxson , V. , and Weaver ., N. How to own the internet in your spare time . In Proc. USENIX Security ( 2002 ). ]]Staniford, S., Paxson, V., and Weaver., N. How to own the internet in your spare time. In Proc. USENIX Security (2002)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948211"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '10"},"container-title":["Proceedings of the 2010 ACM workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866835.1866849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866835.1866849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:59Z","timestamp":1750243979000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866835.1866849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,8]]},"references-count":33,"alternative-id":["10.1145\/1866835.1866849","10.1145\/1866835"],"URL":"https:\/\/doi.org\/10.1145\/1866835.1866849","relation":{},"subject":[],"published":{"date-parts":[[2010,10,8]]},"assertion":[{"value":"2010-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}