{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:39:23Z","timestamp":1747190363129,"version":"3.40.5"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T00:00:00Z","timestamp":1609286400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016QY06X1205"],"award-info":[{"award-number":["2016QY06X1205"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,30]]},"abstract":"<jats:p>The Internet is more and more integrated into people\u2019s life; because of the complexity and fragility of the network environment, network attack presents a more and more serious trend. Application Layer DDoS (AL-DDoS) attack is the most complex form of DDoS attack, which is hindering the availability for the legitimate users by taking up a large number of requests of web server. The paper introduced the concept of behavior utility to portray the network. The concept of attack and defense utility was defined by a specific property which was the manifestation of the network risk after the offset of attack and defense. In the utility model, traffic metrics were mapped to the multidimensional parallelotope in the Euclidean space to express as a diagonal matrix. To determine the threshold status, the defense strategies of load balancing and limiting the maximum number of connections were used with different attack scales. Finally, the attack and defense utility value was calculated to evaluate the network risk level. The proposed method can master the capacity of network system against each attack means and the defense capability of network system. Its availability and accuracy are verified by comparing with the relevant works.<\/jats:p>","DOI":"10.1155\/2020\/6679304","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T20:20:34Z","timestamp":1609359634000},"page":"1-11","source":"Crossref","is-referenced-by-count":5,"title":["Defending Application Layer DDoS Attacks via Multidimensional Parallelotope"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9741-2954","authenticated-orcid":true,"given":"Xiaolin","family":"Zhao","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7461-322X","authenticated-orcid":true,"given":"Hui","family":"Peng","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8688-4019","authenticated-orcid":true,"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, Beijing 100101, China"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3087-9701","authenticated-orcid":true,"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6469-326X","authenticated-orcid":true,"given":"Yaoyuan","family":"Liang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8609-1705","authenticated-orcid":true,"given":"Mingzhe","family":"Pei","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing 100081, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.16"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2015.7387905"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232817"},{"issue":"8","key":"4","first-page":"2164","article-title":"Network security situation assessment method based on naive Bayes classifier","volume":"35","author":"Z. Wen","year":"2015","journal-title":"Journal of Computer Applications"},{"issue":"6","key":"5","first-page":"1719","article-title":"Network security measurement based on dependency relationship graph and common vulnerability scoring system","volume":"39","author":"J. X. Wang","year":"2019","journal-title":"Journal of Computer Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.09.001"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6678928"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2013.112613.132275"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCT.2018.8356848"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/252\/3\/032013"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2870658"},{"first-page":"1","article-title":"A study of the feasibility of co-located app attacks against BLE and a large-scale analysis of the current application-layer security landscape","author":"P. Sivakumaran","key":"12"},{"first-page":"1133","article-title":"Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms","author":"W. Zhou","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017100103"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2758754"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02767-z"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2487361"},{"first-page":"19","article-title":"The crossPath attack: disrupting the SDN control channel via shared links","author":"J. Cao","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8469410"},{"key":"20","first-page":"1","article-title":"An integrated honeypot framework for proactive detection, characterization and redirection of DDoS attacks at ISP level","volume":"1","author":"A. Sardana","year":"2018","journal-title":"Journal of Information Assurance and Security"},{"key":"21","first-page":"67","article-title":"Construction of human subject: expansion and limitation of the perspective of network sociology","volume":"5","author":"K. Tang","year":"2017","journal-title":"Social Sciences in Hunan"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.02.010"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/jisic.2014.21"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.030"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919141"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1281700.1281708"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6679304.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6679304.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6679304.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T20:20:47Z","timestamp":1609359647000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/6679304\/"}},"subtitle":[],"editor":[{"given":"Zhe-Li","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,30]]},"references-count":26,"alternative-id":["6679304","6679304"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6679304","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,12,30]]}}}