{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:00:44Z","timestamp":1725559244003},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258094"},{"type":"electronic","value":"9783540320173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_16","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:01:28Z","timestamp":1279051288000},"page":"191-204","source":"Crossref","is-referenced-by-count":2,"title":["Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Basheer","family":"Al-Duwairi","sequence":"first","affiliation":[]},{"given":"G.","family":"Manimaran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Aikat, J., Kaur, J., Smith, F.D., Jeffay, K.: Variability in TCP Roundtrip Times. In: Proc. of the ACM SIGCOMM Internet Measurement Conference (IMC 2003), Miami, FL (October 2003)","DOI":"10.1145\/948205.948241"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Chen, S., Song, Q.: Perimeter-Based Defense against High Bandwidth DDoS Attacks. In: Proc. IEEE Transactions on Parallel and Distributed Systems (TPDS 2005) (2005) (to appear)","DOI":"10.1109\/TPDS.2005.74"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, Available at http:\/\/www.cert.org\/advisories\/CA-1998-01.html","DOI":"10.1016\/S1353-4858(98)90152-0"},{"key":"16_CR4","unstructured":"Cheswick, B., Burch, H., Branigan, S.: Mapping and Visualizing the Internet. In: Proc. USENIX Annual Technical Conference (2000)"},{"key":"16_CR5","unstructured":"Cisco systems, Defeating DDoS Attacks, white paper"},{"key":"16_CR6","unstructured":"Cisco systems, Configuring TCP Intercept (Prevent Denial-of-Service Attacks), available at http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/software\/ios113ed\/113ed_cr\/secur_c\/scprt3\/scdenial.htm"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial-of-service attacks which employ IP source address spoofing. RFC 2827 (2000)","DOI":"10.17487\/rfc2827"},{"key":"16_CR8","unstructured":"Gibson, S.: Distributed Reflection Denial of Service (February 22, 2002), Available at http:\/\/grc.com\/dos\/drdos.htm"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In: Proc. ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC (October 2003)","DOI":"10.1145\/948109.948116"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Hussain, A., Heidemann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proceedings of ACM SIGCOMM 2003 (2003)","DOI":"10.1145\/863955.863968"},{"key":"16_CR11","unstructured":"Li, J., Mirkovic, J., Wang, M., Reiher, P., Zhang, L.: SAVE: Source address validity enforcement protocol. In: Proc. of IEEE INFOCOMM 2002 (April 2002)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Mellia, M., Stoica, I., Zhang, H.: TCP Model for Short Lived Flows. In: Proc. IEEE Communication Letters (February 2002)","DOI":"10.1109\/4234.984705"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. Proc. Computer Communication Review\u00a031(3) (July 2001)","DOI":"10.1145\/505659.505664"},{"key":"16_CR14","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from Distributed Denial of Service Attack Using History-based IP Filtering. In: Proc. of IEEE International Conference on Communications (ICC 2003) (May 2003)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Kotagiri, R.: Detecting reflector attacks by sharing beliefs. In: Proc. IEEE Global Communications Conference (October 2003)","DOI":"10.1109\/GLOCOM.2003.1258460"},{"key":"16_CR16","unstructured":"Postel, J.: Internet Protocol - DARPA Internet Program Protocol Specification. RFC 791"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:52:13Z","timestamp":1605642733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11422778_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}