{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:32Z","timestamp":1750306472180,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T00:00:00Z","timestamp":1446076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,29]]},"DOI":"10.1145\/2835043.2835052","type":"proceedings-article","created":{"date-parts":[[2015,12,30]],"date-time":"2015-12-30T13:13:44Z","timestamp":1451481224000},"page":"107-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Detection Algorithm for DoS Attack in the Cloud Environment"],"prefix":"10.1145","author":[{"given":"Priyanka","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, JVWU, Jaipur, India, +917568771880"}]},{"given":"Rachana","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, JVWU, Jaipur, India, +919414254785"}]},{"given":"Emmanuel S.","family":"Pilli","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering MNIT, Jaipur, India, +91-9549658131"}]},{"given":"Anand Kumar","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering MNIT, Jaipur, India, +91-8239360787"}]}],"member":"320","published-online":{"date-parts":[[2015,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"City","author":"Mell P.","year":"2011","unstructured":"Mell , P. and Grance , T . Recommendations of the National Institute of Standards and Technology . City , 2011 . Mell, P. and Grance, T. Recommendations of the National Institute of Standards and Technology. City, 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring","author":"Mitrou N.","year":"2004","unstructured":"Mitrou , N. , Kontovasilis , K. , Rouskas , G. , Iliadis , I. , Merakos , L. , Peng , T. , Leckie , C. and Ramamohanarao , K . Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring . Springer Berlin Heidelberg , City , 2004 . Mitrou, N., Kontovasilis, K., Rouskas, G., Iliadis, I., Merakos, L., Peng, T., Leckie, C. and Ramamohanarao, K. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. Springer Berlin Heidelberg, City, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Bhuyan M. H. Kashyap H. J. Bhattacharyya D. K. and Kalita J. K. March 28 2013. Detecting Distributed Denial of Service Attacks: Methods Tools and Future Directions. The Computer Journal.  Bhuyan M. H. Kashyap H. J. Bhattacharyya D. K. and Kalita J. K. March 28 2013. Detecting Distributed Denial of Service Attacks: Methods Tools and Future Directions. The Computer Journal.","DOI":"10.1093\/comjnl\/bxt031"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1111"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2003.1201153"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE","author":"Yi Z.","year":"2010","unstructured":"Yi , Z. , Qiang , L. and Guofeng , Z . A real-time DDoS attack detection and prevention system based on per-IP traffic behavioral analysis . IEEE , City , 2010 . Yi, Z., Qiang, L. and Guofeng, Z. A real-time DDoS attack detection and prevention system based on per-IP traffic behavioral analysis. IEEE, City, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31979-5_17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.06.002"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE","author":"Yi-Chi W.","year":"2009","unstructured":"Yi-Chi , W. , Huei-Ru , T. , Wuu , Y. and Rong-Hong , J . DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis . IEEE , City , 2009 . Yi-Chi, W., Huei-Ru, T., Wuu, Y. and Rong-Hong, J. DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis. IEEE, City, 2009."},{"volume-title":"Proceedings of the 10th conference on USENIX Security Symposium, (Washington, D.C.). USENIX Association.","author":"Thomer M. G.","key":"e_1_3_2_1_10_1","unstructured":"Thomer , M. G. and Massimiliano , P . 2001. MULTOPS: a data-structure for bandwidth attack detection . in Proceedings of the 10th conference on USENIX Security Symposium, (Washington, D.C.). USENIX Association. Thomer, M. G. and Massimiliano, P. 2001. MULTOPS: a data-structure for bandwidth attack detection. in Proceedings of the 10th conference on USENIX Security Symposium, (Washington, D.C.). USENIX Association."},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE","author":"Thomas R.","year":"2003","unstructured":"Thomas , R. , Hong , Z. , Huck , T. and Johnson , T . NetBouncer: client-legitimacy-based high-performance DDoS filtering . IEEE , City , 2003 . Thomas, R., Hong, Z., Huck, T. and Johnson, T. NetBouncer: client-legitimacy-based high-performance DDoS filtering. IEEE, City, 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"City","author":"Limwiwatkul L.","year":"2004","unstructured":"Limwiwatkul , L. and Rungsawang , A . Distributed denial of service detection using TCP\/IP header and traffic measurement analysis . City , 2004 . Limwiwatkul, L. and Rungsawang, A. Distributed denial of service detection using TCP\/IP header and traffic measurement analysis. City, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxl042"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2194508"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.20"},{"key":"e_1_3_2_1_17_1","unstructured":"The Notorious Nine. City 2013.  The Notorious Nine. City 2013."},{"key":"e_1_3_2_1_18_1","unstructured":"OpenStack Installation Guide for Ubuntu 14.04. City 2015.  OpenStack Installation Guide for Ubuntu 14.04. City 2015."}],"event":{"name":"Compute '15: 8th Annual ACM India Conference","sponsor":["ACM India ACM India"],"location":"Ghaziabad India","acronym":"Compute '15"},"container-title":["Proceedings of the 8th Annual ACM India Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835043.2835052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835043.2835052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:09Z","timestamp":1750225689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835043.2835052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,29]]},"references-count":18,"alternative-id":["10.1145\/2835043.2835052","10.1145\/2835043"],"URL":"https:\/\/doi.org\/10.1145\/2835043.2835052","relation":{},"subject":[],"published":{"date-parts":[[2015,10,29]]},"assertion":[{"value":"2015-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}