{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:21:56Z","timestamp":1725549716273},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258605"},{"type":"electronic","value":"9783540320432"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424758_27","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T16:56:24Z","timestamp":1268412984000},"page":"252-260","source":"Crossref","is-referenced-by-count":0,"title":["Cooperative Security Management Enhancing Survivability Against DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Sung Ki","family":"Kim","sequence":"first","affiliation":[]},{"given":"Byoung Joon","family":"Min","sequence":"additional","affiliation":[]},{"given":"Jin Chul","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Seung Hwan","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, W., Ioannidis, J., McDaniel, P.: Origin Authentication in interdomain routing. In: Proceedings of the 10th ACM conference on Computer and communications security (October 2003)","DOI":"10.1145\/948109.948133"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing, 20\u201326 (March-April 2002)","DOI":"10.1109\/4236.991439"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Belenky, A., Ansari, N.: On IP Traceback. IEEE Communications Magazine (July 2003)","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"27_CR4","unstructured":"Ioannidis, J., Bellovin, S.: Implementing Pushback: Router-Based Defense Against DDoS Attacks. In: Proceedings of the Network and Distributed System Security Symposium (February 2002)"},{"key":"27_CR5","unstructured":"KICS of Korea Information Security Agency: Intercept and Analysis Technologies Against DDoS Attacks (September 2004)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Characterization of Network- Wide Anomalies in Traffic Flows. In: IMC 2004 (October 2004)","DOI":"10.1145\/1028788.1028813"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Bellovin, S.M., Floyd, S., loannidis, J., Paxson, V., Shenker, S.: Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communications Review\u00a032(3) (July 2002)","DOI":"10.1145\/571697.571724"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Min, B.J., Kim, S.K., Choi, J.S.: Secure System Architecture Based on Dynamic Resource Reallocation. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 174\u2013187. Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-24591-9_14"},{"key":"27_CR9","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Defending Against Distributed Denial of Services Attacks Using Selective Pushback. In: Proceedings of the 9th IEEE Int\u2019l Conference on Telecommunications (June 2002)"},{"key":"27_CR10","unstructured":"BGPExpert.com : How to Get Rid of Denial of Service Attacks, http:\/\/www.bgpexpert.com\/antidos.php"},{"key":"27_CR11","unstructured":"Cisco : Unicast Reverse Path Forw -ding(uRPF) Enhancements for the ISP-ISP Edge, ftp:\/\/ft-eng.cisco.com\/cons\/isp\/security\/URPF-ISP.pdf"},{"key":"27_CR12","unstructured":"waterspring.org : Configuring BGP to Block Denial-of-Service Attacks, http:\/\/www.watersprings.org\/pub\/id\/draft-turk-bgp-dos-01.txt"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424758_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:53:51Z","timestamp":1605642831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424758_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258605","9783540320432"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11424758_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}