{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:06:54Z","timestamp":1775326014339,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1527086"],"award-info":[{"award-number":["CNS-1527086"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813633","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1530-1541","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Maneuvering Around Clouds"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Vissers","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Tom","family":"Van Goethem","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4786"},{"key":"e_1_3_2_1_2_1","unstructured":"S. Agarwal T. Dawson and C. Tryfonas. Ddos mitigation via regional cleaning centers. Technical report.  S. Agarwal T. Dawson and C. Tryfonas. Ddos mitigation via regional cleaning centers. Technical report."},{"key":"e_1_3_2_1_3_1","unstructured":"Alexa. Alexa - Actionable Analytics for the Web. http:\/\/www.alexa.com\/ 2014.  Alexa. Alexa - Actionable Analytics for the Web. http:\/\/www.alexa.com\/ 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"Arbor Networks. Worldwide Infrastructure Security Report. http:\/\/pages.arbornetworks.com\/rs\/arbor\/images\/WISR2014_EN2014.pdf 2015.  Arbor Networks. Worldwide Infrastructure Security Report. http:\/\/pages.arbornetworks.com\/rs\/arbor\/images\/WISR2014_EN2014.pdf 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/blog.sucuri.net\/2014\/03\/more-than-162000-wordpress-sites-used-for-distributed-denial- of-service-attack.html","author":"Cid D.","year":"2014","unstructured":"D. Cid . More Than 162,000 WordPress Sites Used for Distributed Denial of Service Attack . http:\/\/blog.sucuri.net\/2014\/03\/more-than-162000-wordpress-sites-used-for-distributed-denial- of-service-attack.html , 2014 . D. Cid. More Than 162,000 WordPress Sites Used for Distributed Denial of Service Attack. http:\/\/blog.sucuri.net\/2014\/03\/more-than-162000-wordpress-sites-used-for-distributed-denial- of-service-attack.html, 2014."},{"key":"e_1_3_2_1_6_1","unstructured":"CloudFlare Watch. http:\/\/www.crimeflare.com\/.  CloudFlare Watch. http:\/\/www.crimeflare.com\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Cloudflare sees explosive growth","year":"2013","unstructured":"CloudFlare. Cloudflare sees explosive growth in 2013 . http:\/\/www.marketwired.com\/press-release\/cloudflare-sees-explosive-growth-2013-passes-15-million-customers-revenue-up-450-network-1862981.htm, 2013. CloudFlare. Cloudflare sees explosive growth in 2013. http:\/\/www.marketwired.com\/press-release\/cloudflare-sees-explosive-growth-2013-passes-15-million-customers-revenue-up-450-network-1862981.htm, 2013."},{"key":"e_1_3_2_1_8_1","unstructured":"CloudFlare Inc. Sign up | CloudFlare | The web performance and security company. https:\/\/www.cloudflare.com\/sign-up 2015.  CloudFlare Inc. Sign up | CloudFlare | The web performance and security company. https:\/\/www.cloudflare.com\/sign-up 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Tweak Settings - Domains. https:\/\/documentation.cpanel.net\/display\/ALD\/Tweak+Settings+-+Domains#TweakSettings-Domains-Proxysubdomains","author":"cPanel","year":"2015","unstructured":"cPanel . Tweak Settings - Domains. https:\/\/documentation.cpanel.net\/display\/ALD\/Tweak+Settings+-+Domains#TweakSettings-Domains-Proxysubdomains , 2015 . cPanel. Tweak Settings - Domains. https:\/\/documentation.cpanel.net\/display\/ALD\/Tweak+Settings+-+Domains#TweakSettings-Domains-Proxysubdomains, 2015."},{"key":"e_1_3_2_1_10_1","unstructured":"cPanel Inc. cPanel and WHM. http:\/\/cpanel.net\/ 2015.  cPanel Inc. cPanel and WHM. http:\/\/cpanel.net\/ 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_1_12_1","unstructured":"DomainTools LLC. Domain Whois Lookup Whois API and DNS Data Research - DomainTools. http:\/\/www.domaintools.com\/ 2015.  DomainTools LLC. Domain Whois Lookup Whois API and DNS Data Research - DomainTools. http:\/\/www.domaintools.com\/ 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_1_14_1","first-page":"605","volume-title":"USENIX Security","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric , E. Wustrow , and J. A. Halderman . Zmap: Fast internet-wide scanning and its security applications . In USENIX Security , pages 605 -- 620 . Citeseer , 2013 . Z. Durumeric, E. Wustrow, and J. A. Halderman. Zmap: Fast internet-wide scanning and its security applications. In USENIX Security, pages 605--620. Citeseer, 2013."},{"key":"e_1_3_2_1_15_1","unstructured":"K. Fiveash. PlayStation clambers back online days after DDoS attack PARALYSED network. http:\/\/www.theregister.co.uk\/2014\/12\/27\/playstation_clambers_back_online\/ 2014.  K. Fiveash. PlayStation clambers back online days after DDoS attack PARALYSED network. http:\/\/www.theregister.co.uk\/2014\/12\/27\/playstation_clambers_back_online\/ 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/support.google.com\/webmasters\/answer\/182072?hl=en","year":"2015","unstructured":"Google. Googlebot. https:\/\/support.google.com\/webmasters\/answer\/182072?hl=en , 2015 . Google. Googlebot. https:\/\/support.google.com\/webmasters\/answer\/182072?hl=en, 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"Zhang-Shasha: Tree edit distance in Python. https:\/\/github.com\/timtadh\/zhang-shasha","author":"Henderson T.","year":"2014","unstructured":"T. Henderson and S. Johnson . Zhang-Shasha: Tree edit distance in Python. https:\/\/github.com\/timtadh\/zhang-shasha , 2014 . T. Henderson and S. Johnson. Zhang-Shasha: Tree edit distance in Python. https:\/\/github.com\/timtadh\/zhang-shasha, 2014."},{"key":"e_1_3_2_1_18_1","unstructured":"A. Hidayat. PhantomJS - a headless WebKit scriptable with a JavaScript API. http:\/\/phantomjs.org 2015.  A. Hidayat. PhantomJS - a headless WebKit scriptable with a JavaScript API. http:\/\/phantomjs.org 2015."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189740.1189745"},{"key":"e_1_3_2_1_20_1","volume-title":"LEET","author":"Karami M.","year":"2013","unstructured":"M. Karami and D. McCoy . Understanding the emerging threat of ddos-as-a-service . In LEET , 2013 . M. Karami and D. McCoy. Understanding the emerging threat of ddos-as-a-service. In LEET, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Kitterman Scott. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. http:\/\/tools.ietf.org\/html\/rfc7208 2014.  Kitterman Scott. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. http:\/\/tools.ietf.org\/html\/rfc7208 2014.","DOI":"10.17487\/rfc7208"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089077"},{"key":"e_1_3_2_1_23_1","unstructured":"B. Krebs. The New Normal: 200--400 Gbps DDoS Attacks. http:\/\/krebsonsecurity.com\/2014\/02\/the-new-normal-200--400-gbps-ddos-attacks\/ 2014.  B. Krebs. The New Normal: 200--400 Gbps DDoS Attacks. http:\/\/krebsonsecurity.com\/2014\/02\/the-new-normal-200--400-gbps-ddos-attacks\/ 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium","author":"K\u00fchrer M.","year":"2014","unstructured":"M. K\u00fchrer , T. Hupperich , C. Rossow , and T. Holz . Exit from hell? reducing the impact of amplification ddos attacks . In USENIX Security Symposium , 2014 . M. K\u00fchrer, T. Hupperich, C. Rossow, and T. Holz. Exit from hell? reducing the impact of amplification ddos attacks. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_25_1","unstructured":"S. Langridge and I. Hickson. Pingback 1.0. http:\/\/www.hixie.ch\/specs\/pingback\/pingback 2002.  S. Langridge and I. Hickson. Pingback 1.0. http:\/\/www.hixie.ch\/specs\/pingback\/pingback 2002."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.025"},{"key":"e_1_3_2_1_27_1","volume-title":"Bypassing Content Delivery Security. https:\/\/blogs.akamai.com\/2013\/08\/bypassing-content-delivery-security.html","author":"Lewis D.","year":"2013","unstructured":"D. Lewis . Bypassing Content Delivery Security. https:\/\/blogs.akamai.com\/2013\/08\/bypassing-content-delivery-security.html , 2013 . D. Lewis. Bypassing Content Delivery Security. https:\/\/blogs.akamai.com\/2013\/08\/bypassing-content-delivery-security.html, 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.12"},{"key":"e_1_3_2_1_29_1","unstructured":"B. Lyon. Network overload detection and mitigation system and method Jan. 13 2009. US Patent 7 478 429.  B. Lyon. Network overload detection and mitigation system and method Jan. 13 2009. US Patent 7 478 429."},{"key":"e_1_3_2_1_30_1","unstructured":"K. Martens J. Mehnle and S. Kitterman. SPF Record Syntax. http:\/\/www.openspf.org\/SPF_Record_Syntax 2008.  K. Martens J. Mehnle and S. Kitterman. SPF Record Syntax. http:\/\/www.openspf.org\/SPF_Record_Syntax 2008."},{"key":"e_1_3_2_1_31_1","volume-title":"https:\/\/www.nccgroup.com\/media\/230388\/the_pentesters_guide_to_akamai.pdf","author":"McDonald D.","year":"2013","unstructured":"D. McDonald . The Pentesters Guide to Akamai . https:\/\/www.nccgroup.com\/media\/230388\/the_pentesters_guide_to_akamai.pdf , 2013 . D. McDonald. The Pentesters Guide to Akamai. https:\/\/www.nccgroup.com\/media\/230388\/the_pentesters_guide_to_akamai.pdf, 2013."},{"key":"e_1_3_2_1_32_1","volume-title":"WordPress Pingback Attacks and our WAF. https:\/\/blog.cloudflare.com\/wordpress-pingback-attacks-and-our-waf\/","year":"2014","unstructured":"Moore, Simon. WordPress Pingback Attacks and our WAF. https:\/\/blog.cloudflare.com\/wordpress-pingback-attacks-and-our-waf\/ , 2014 . Moore, Simon. WordPress Pingback Attacks and our WAF. https:\/\/blog.cloudflare.com\/wordpress-pingback-attacks-and-our-waf\/, 2014."},{"key":"e_1_3_2_1_33_1","unstructured":"MYIP.MS. My IP Address - Shows IPv4 and IPv6 | Blacklist IP Check - Hosting Info. http:\/\/myip.ms\/ 2015.  MYIP.MS. My IP Address - Shows IPv4 and IPv6 | Blacklist IP Check - Hosting Info. http:\/\/myip.ms\/ 2015."},{"key":"e_1_3_2_1_34_1","volume-title":"Black Hat USA","author":"Nixon A.","year":"2013","unstructured":"A. Nixon and C. Camejo . Ddos protection bypass techniques . Black Hat USA , 2013 . A. Nixon and C. Camejo. Ddos protection bypass techniques. Black Hat USA, 2013."},{"key":"e_1_3_2_1_35_1","unstructured":"P. Olson. The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites. http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/20\/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites\/ 2014.  P. Olson. The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites. http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/20\/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites\/ 2014."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/github.com\/darkoperator\/dnsrecon","author":"Perez C.","year":"2015","unstructured":"C. Perez . DNS Recon . https:\/\/github.com\/darkoperator\/dnsrecon , 2015 . C. Perez. DNS Recon. https:\/\/github.com\/darkoperator\/dnsrecon, 2015."},{"key":"e_1_3_2_1_37_1","volume-title":"CloudFlare Now Supporting More Ports. https:\/\/blog.cloudflare.com\/cloudflare-now-supporting-more-ports\/","author":"Prince M.","year":"2012","unstructured":"M. Prince . CloudFlare Now Supporting More Ports. https:\/\/blog.cloudflare.com\/cloudflare-now-supporting-more-ports\/ , 2012 . M. Prince. CloudFlare Now Supporting More Ports. https:\/\/blog.cloudflare.com\/cloudflare-now-supporting-more-ports\/, 2012."},{"key":"e_1_3_2_1_38_1","volume-title":"The DDoS That Almost Broke the Internet. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/","author":"Prince M.","year":"2013","unstructured":"M. Prince . The DDoS That Almost Broke the Internet. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/ , 2013 . M. Prince. The DDoS That Almost Broke the Internet. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/, 2013."},{"key":"e_1_3_2_1_39_1","volume-title":"http:\/\/www.proximic.com\/spider.html","author":"Spider Proximic","year":"2015","unstructured":"Proximic. Proximic Spider . http:\/\/www.proximic.com\/spider.html , 2015 . Proximic. Proximic Spider. http:\/\/www.proximic.com\/spider.html, 2015."},{"key":"e_1_3_2_1_40_1","unstructured":"Q-Success. Market share trends for content management systems for websites. http:\/\/w3techs.com\/technologies\/history_overview\/content_management 2015.  Q-Success. Market share trends for content management systems for websites. http:\/\/w3techs.com\/technologies\/history_overview\/content_management 2015."},{"key":"e_1_3_2_1_41_1","volume-title":"Internet-Wide Scan Data Repository. Project Sonar: IPv4 SSL Certificates. https:\/\/sonar.labs.rapid7.com\/","year":"2015","unstructured":"Rapid7 Labs. Internet-Wide Scan Data Repository. Project Sonar: IPv4 SSL Certificates. https:\/\/sonar.labs.rapid7.com\/ , 2015 . Rapid7 Labs. Internet-Wide Scan Data Repository. Project Sonar: IPv4 SSL Certificates. https:\/\/sonar.labs.rapid7.com\/, 2015."},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/sonar.labs.rapid7.com\/","author":"Sonar Project","year":"2015","unstructured":"Rapid7 Labs. Project Sonar . https:\/\/sonar.labs.rapid7.com\/ , 2015 . Rapid7 Labs. Project Sonar. https:\/\/sonar.labs.rapid7.com\/, 2015."},{"key":"e_1_3_2_1_43_1","volume-title":"http:\/\/www.crummy.com\/software\/BeautifulSoup\/","author":"Richardson L.","year":"2013","unstructured":"L. Richardson . Beautiful Soup . http:\/\/www.crummy.com\/software\/BeautifulSoup\/ , 2013 . L. Richardson. Beautiful Soup. http:\/\/www.crummy.com\/software\/BeautifulSoup\/, 2013."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550367"},{"key":"e_1_3_2_1_45_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proceedings of the 2014 Network and Distributed System Security (NDSS) Symposium","author":"Rossow C.","year":"2014","unstructured":"C. Rossow . Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proceedings of the 2014 Network and Distributed System Security (NDSS) Symposium , February 2014 . C. Rossow. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proceedings of the 2014 Network and Distributed System Security (NDSS) Symposium, February 2014."},{"key":"e_1_3_2_1_46_1","unstructured":"Stephenson MaAnna. Disable XML-RPC in WordPress to Prevent DDoS Attack. http:\/\/www.blogaid.net\/disable-xml-rpc-in-wordpress-to-prevent-ddos-attack 2014.  Stephenson MaAnna. Disable XML-RPC in WordPress to Prevent DDoS Attack. http:\/\/www.blogaid.net\/disable-xml-rpc-in-wordpress-to-prevent-ddos-attack 2014."},{"key":"e_1_3_2_1_47_1","unstructured":"H. Story and A. Sambra. Friending on the Social Web. http:\/\/bblfish.net\/tmp\/2011\/05\/09\/ 2011.  H. Story and A. Sambra. Friending on the Social Web. http:\/\/bblfish.net\/tmp\/2011\/05\/09\/ 2011."},{"key":"e_1_3_2_1_48_1","volume-title":"DDoS Prevention: Protecting The Origin. https:\/\/blog.cloudflare.com\/ddos-prevention-protecting-the-origin\/","author":"Sullivan N.","year":"2013","unstructured":"N. Sullivan . DDoS Prevention: Protecting The Origin. https:\/\/blog.cloudflare.com\/ddos-prevention-protecting-the-origin\/ , 2013 . N. Sullivan. DDoS Prevention: Protecting The Origin. https:\/\/blog.cloudflare.com\/ddos-prevention-protecting-the-origin\/, 2013."},{"key":"e_1_3_2_1_49_1","unstructured":"The PHP Group. PHP: phpinfo - Manual. http:\/\/php.net\/manual\/en\/function.phpinfo.php 2015.  The PHP Group. PHP: phpinfo - Manual. http:\/\/php.net\/manual\/en\/function.phpinfo.php 2015."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813115"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_8"},{"key":"e_1_3_2_1_52_1","unstructured":"S. J. Vaughan-Nichols. Worst DDoS attack of all time hits French site. http:\/\/www.zdnet.com\/article\/worst-ddos-attack-of-all-time-hits-french-site\/ 2014.  S. J. Vaughan-Nichols. Worst DDoS attack of all time hits French site. http:\/\/www.zdnet.com\/article\/worst-ddos-attack-of-all-time-hits-french-site\/ 2014."},{"key":"e_1_3_2_1_53_1","unstructured":"R. Westervelt. Cloud-Based DDoS Protection Is Easily Bypassed Says Researcher. http:\/\/www.crn.com\/news\/security\/240159295\/cloud-based-ddos-protection-is-easily-bypassed-says-researcher.htm 2013.  R. Westervelt. Cloud-Based DDoS Protection Is Easily Bypassed Says Researcher. http:\/\/www.crn.com\/news\/security\/240159295\/cloud-based-ddos-protection-is-easily-bypassed-says-researcher.htm 2013."},{"key":"e_1_3_2_1_54_1","volume-title":"WordPress: Blog Tool","year":"2015","unstructured":"WordPress.org. WordPress: Blog Tool , Publishing Platform , and CMS. http:\/\/wordpress.org, 2015 . WordPress.org. WordPress: Blog Tool, Publishing Platform, and CMS. http:\/\/wordpress.org, 2015."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218082"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813633","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813633"}},"subtitle":["Bypassing Cloud-based Security Providers"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":55,"alternative-id":["10.1145\/2810103.2813633","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813633","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}