{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:17Z","timestamp":1750306277721,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905169","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments"],"prefix":"10.1145","author":[{"given":"Akashdeep","family":"Bhardwaj","sequence":"first","affiliation":[{"name":"UPES, Bidholi, Dehradun"}]},{"given":"G. V. B.","family":"Subrahmanyam","sequence":"additional","affiliation":[{"name":"Tech Mahindra, Hyderabad, India"}]},{"given":"Vinay","family":"Avasthi","sequence":"additional","affiliation":[{"name":"UPES, Bidholi, Dehradun"}]},{"given":"Hanumat","family":"Sastry","sequence":"additional","affiliation":[{"name":"UPES, Bidholi, Dehradun"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"J\u00e9r\u00f4me Fran\u00e7ois Issam Aib and Raouf Boutaba \"FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks\" IEEE 2012  J\u00e9r\u00f4me Fran\u00e7ois Issam Aib and Raouf Boutaba \"FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks\" IEEE 2012","DOI":"10.1109\/TNET.2012.2194508"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Igor Anastasov Danco Davce \"SIEM Implementation for Global and Distributed Environments\" IEEE 2014  Igor Anastasov Danco Davce \"SIEM Implementation for Global and Distributed Environments\" IEEE 2014","DOI":"10.1109\/WCCAIS.2014.6916651"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Eric Chan-Tin Tingting Chen and Subhash Kak \"A Comprehensive Security Model for Networking Applications\" IEEE 2012   Eric Chan-Tin Tingting Chen and Subhash Kak \"A Comprehensive Security Model for Networking Applications\" IEEE 2012","DOI":"10.1109\/ICCCN.2012.6289238"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Zhong-Hua Pang and Guo-Ping Liu \"Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks\" IEEE 2012  Zhong-Hua Pang and Guo-Ping Liu \"Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks\" IEEE 2012","DOI":"10.1109\/TCST.2011.2160543"},{"key":"e_1_3_2_1_5_1","unstructured":"Radwane Saad Farid Na\u00eft-Abdesselam and Ahmed Serhrouchni\" \"A Collaborative Peer-to-Peer Architecture to Defend Against DDoS Attacks\" IEEE 2012  Radwane Saad Farid Na\u00eft-Abdesselam and Ahmed Serhrouchni\" \"A Collaborative Peer-to-Peer Architecture to Defend Against DDoS Attacks\" IEEE 2012"},{"key":"e_1_3_2_1_6_1","unstructured":"J. Yu C. Fang L. Lu and Z. Li \"Mitigating application layer distributed denial of service attacks via effective trust management\" IEEE 2012  J. Yu C. Fang L. Lu and Z. Li \"Mitigating application layer distributed denial of service attacks via effective trust management\" IEEE 2012"},{"key":"e_1_3_2_1_7_1","unstructured":"Mohamad Samir A. Eid and Hitoshi Aida \"Securely Hiding the Real Servers from DDoS Floods\" IEEE 2010  Mohamad Samir A. Eid and Hitoshi Aida \"Securely Hiding the Real Servers from DDoS Floods\" IEEE 2010"},{"key":"e_1_3_2_1_8_1","unstructured":"Zhijun Wu and Zhifeng Chen \"THREE-LAYER DEFENSE MECHANISM BASED ON WEB SERVERS AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS\" IEEE 2011  Zhijun Wu and Zhifeng Chen \"THREE-LAYER DEFENSE MECHANISM BASED ON WEB SERVERS AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS\" IEEE 2011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Avinash Kumar Singh and Sangita Roy \"A Network Based Vulnerability Scanner for Detecting SQLI Attacks in Web Applications\" IEEE 2012  Avinash Kumar Singh and Sangita Roy \"A Network Based Vulnerability Scanner for Detecting SQLI Attacks in Web Applications\" IEEE 2012","DOI":"10.1109\/RAIT.2012.6194594"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Va. Bekeneva N. Shipilov K. Borisenko A. Shorov \"Simulation of DDoS-attacks and Protection Mechanisms Against Them\" IEEE 2015  Va. Bekeneva N. Shipilov K. Borisenko A. Shorov \"Simulation of DDoS-attacks and Protection Mechanisms Against Them\" IEEE 2015","DOI":"10.1109\/EIConRusNW.2015.7102230"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Bansidhar Joshi A. Santhana Vijayan and Bineet Kumar Joshi \"Securing Cloud Computing Environment Against DDoS Attacks\" IEEE 2012  Bansidhar Joshi A. Santhana Vijayan and Bineet Kumar Joshi \"Securing Cloud Computing Environment Against DDoS Attacks\" IEEE 2012","DOI":"10.1109\/ICCCI.2012.6158817"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Paolo Gasti Gene Tsudik \"DoS & DDoS in Named Data Networking\" IEEE 2013  Paolo Gasti Gene Tsudik \"DoS & DDoS in Named Data Networking\" IEEE 2013","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sakis Meliopoulos Seth Walters Paul Myrda \"Cyber Security and Operational Reliability\" IEEE 2015  Sakis Meliopoulos Seth Walters Paul Myrda \"Cyber Security and Operational Reliability\" IEEE 2015","DOI":"10.1109\/HICSS.2015.320"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Cornel Barna Mark Shtern Michael Smit Vassilios Tzerpos Marin Litoiu \"Model-Based Adaptive DoS Attack Mitigation\" IEEE 2012  Cornel Barna Mark Shtern Michael Smit Vassilios Tzerpos Marin Litoiu \"Model-Based Adaptive DoS Attack Mitigation\" IEEE 2012","DOI":"10.1109\/SEAMS.2012.6224398"},{"key":"e_1_3_2_1_15_1","unstructured":"Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou \"DDoS Attack Protection in Era of Cloud Computing and Software-Defined Networking\" IEEE 2012  Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou \"DDoS Attack Protection in Era of Cloud Computing and Software-Defined Networking\" IEEE 2012"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"S. Nair S. Abraham Al. Ibrahim \"Security Architecture for Resource-Limited Environments\" IEEE 2011  S. Nair S. Abraham Al. Ibrahim \"Security Architecture for Resource-Limited Environments\" IEEE 2011","DOI":"10.1109\/IWCMC.2011.5982569"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Paolo Gasti Gene Tsudik \"DoS & DDoS in Named Data Networking\" IEEE 2013  Paolo Gasti Gene Tsudik \"DoS & DDoS in Named Data Networking\" IEEE 2013","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Cornel Barna Mark Shtern Michael Smit Vassilios Tzerpos Marin Litoiu \"Model-Based Adaptive DoS Attack Mitigation IEEE 2012  Cornel Barna Mark Shtern Michael Smit Vassilios Tzerpos Marin Litoiu \"Model-Based Adaptive DoS Attack Mitigation IEEE 2012","DOI":"10.1109\/SEAMS.2012.6224398"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Prabhakaran Kasinathan Claudio Pastrone Maurizio A. Spirito \"Denial-of-Service detection in 6LoWPAN based Internet of Things\" IEEE 2013  Prabhakaran Kasinathan Claudio Pastrone Maurizio A. Spirito \"Denial-of-Service detection in 6LoWPAN based Internet of Things\" IEEE 2013","DOI":"10.1109\/WiMOB.2013.6673419"},{"volume-title":"IEEE 2013","author":"Dabin Fang Huikai Li","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Jian Yuan and Kevin Mills IEEE 2010 \"Monitoring the Macroscopic Effect of DDoS Flooding Attacks\"  Jian Yuan and Kevin Mills IEEE 2010 \"Monitoring the Macroscopic Effect of DDoS Flooding Attacks\""},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Ting Wang Yu Xia Dong Lin Mounir Hamdi \"Improving the Efficiency of Server-centric Data Center Network Architectures\" IEEE 2014  Ting Wang Yu Xia Dong Lin Mounir Hamdi \"Improving the Efficiency of Server-centric Data Center Network Architectures\" IEEE 2014","DOI":"10.1109\/ICC.2014.6883795"},{"key":"e_1_3_2_1_23_1","unstructured":"Sheheryar Malik Fabrice Huet Denis Caromel \"RACS: A Framework for Resource Aware Cloud Computing\" IEEE 2012  Sheheryar Malik Fabrice Huet Denis Caromel \"RACS: A Framework for Resource Aware Cloud Computing\" IEEE 2012"},{"key":"e_1_3_2_1_24_1","unstructured":"Dileep Kumar G Dr CV Guru Rao Dr Manoj Kumar Singh Dr Satyanarayana G \"Survey on Defense Mechanisms countering DDoS Attacks in the Network\" IJARCCE 2013  Dileep Kumar G Dr CV Guru Rao Dr Manoj Kumar Singh Dr Satyanarayana G \"Survey on Defense Mechanisms countering DDoS Attacks in the Network\" IJARCCE 2013"},{"volume-title":"IJARCSMS 2014","author":"Dr R. S.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"Dr Shui Yu \"Distributed Denial of Service Attack and Defence\" Springer 2014  Dr Shui Yu \"Distributed Denial of Service Attack and Defence\" Springer 2014"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905169","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":26,"alternative-id":["10.1145\/2905055.2905169","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905169","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}