{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:05Z","timestamp":1766298245884,"version":"build-2065373602"},"reference-count":32,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":74,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Distributed denial\u2010of\u2010service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. To study the impact of defense strategy selection on DDoS attack behavior, the current study uses logistic function as basis to propose a dynamic model of DDoS attacks with defending strategy decisions. Thereafter, the attacked threshold of this model is calculated. The existence and stability of attack\u2010free and attacked equilibria are proved. Lastly, some effective strategies to mitigate DDoS attacks are suggested through parameter analysis.<\/jats:p>","DOI":"10.1155\/2021\/6694383","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T18:36:23Z","timestamp":1615919783000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Impact of Defending Strategy Decision on DDoS Attack"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4993-8193","authenticated-orcid":false,"given":"Chunming","family":"Zhang","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"key":"e_1_2_8_1_2","first-page":"39","article-title":"A taxonomy of DDoS attack and DDoS defense mechanisms","volume":"34","author":"Mirkovic J.","year":"2004","journal-title":"ACM Special Interest Group on Data Communication"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.031413.00127"},{"key":"e_1_2_8_3_2","unstructured":"PasseriP. Cyber attacks statistics 2016."},{"key":"e_1_2_8_4_2","unstructured":"PasseriP. Symantec internet security threat report 2019."},{"key":"e_1_2_8_5_2","unstructured":"SharwoodS. Winter olympics website downed by cyber attack 2020."},{"key":"e_1_2_8_6_2","unstructured":"RangerS. GitHub hit with the largest DDoS attack ever seen 2020."},{"key":"e_1_2_8_7_2","unstructured":"ArboledaN. AWS hit by DDoS attack dragging half of web down 2020."},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.01.028"},{"key":"e_1_2_8_9_2","doi-asserted-by":"crossref","unstructured":"KumarU.andPandeyS. K. Dynamic model on DDoS attack in computer network 2016.","DOI":"10.1145\/2980258.2980289"},{"key":"e_1_2_8_10_2","first-page":"315","article-title":"Study of a mathematical model for a distributed attack on targeted resources in a computer network","volume":"3","author":"Hou W. T.","year":"2016","journal-title":"Journal of Natural Science of Heilongjiang University"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1515\/nleng-2017-0094"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5353060"},{"key":"e_1_2_8_13_2","doi-asserted-by":"crossref","unstructured":"ZhangC. M. PengJ. B. andXiaoJ. W. Advanced persistent distributed denial of service attack model on scale-free networks 2018.","DOI":"10.1155\/2018\/5353060"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2051489"},{"key":"e_1_2_8_15_2","article-title":"Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential e-epidemic model","volume":"2019","author":"Rao Y. S.","year":"2019","journal-title":"Physica A: Statistical Mechanics and Its Applications"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3015220"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995591"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2019.2942591"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2972577"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2020.04.015"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.05.009"},{"key":"e_1_2_8_22_2","article-title":"Voluntary vaccination through perceiving epidemic severity in social networks","volume":"2019","author":"Liu G.","year":"2019","journal-title":"Complexity"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/17513758.2015.1099749"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/825734"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615412"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-010-9826-z"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.06.018"},{"key":"e_1_2_8_28_2","article-title":"An introduction to dynamical systems: continuous and discrete","volume":"2012","author":"Robinson R. C.","year":"2012","journal-title":"American Mathematical Society"},{"key":"e_1_2_8_29_2","doi-asserted-by":"publisher","DOI":"10.1002\/mma.4061"},{"key":"e_1_2_8_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2885251"},{"key":"e_1_2_8_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2956860"},{"key":"e_1_2_8_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.08.021"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6694383.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6694383.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6694383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T21:34:38Z","timestamp":1723239278000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6694383"}},"subtitle":[],"editor":[{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6694383"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6694383","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-10-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6694383"}}