{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:38Z","timestamp":1725551858414},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540305101"},{"type":"electronic","value":"9783540322771"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590354_4","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T11:20:28Z","timestamp":1132053628000},"page":"25-34","source":"Crossref","is-referenced-by-count":0,"title":["Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection"],"prefix":"10.1007","author":[{"given":"Jongho","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jaeik","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Jongsub","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial-of-Service Activity (February 2001)","DOI":"10.21236\/ADA400003"},{"key":"4_CR2","unstructured":"Lan., F., Rubin, S.H., Smith, M.H., Trajovic, L.: Distributed Denial of Service Attacks. IEEE International Conference on System, Man, and Cybernetics (2000)"},{"key":"4_CR3","unstructured":"Gibson, S.: DRDoS (February 2002), http:\/\/grc.com\/doc\/drdos\/htm"},{"key":"4_CR4","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy., Technicalreport, De-part. Of Computer Engineering, Chalmers University (2000)"},{"key":"4_CR5","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Detecting Distributed Denial of Service Attack Using Source IP Address Monitoring"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T.: Efficient Packet Masking for Large-Scale IP Traceback. In: CCS 2002 (November 2002)","DOI":"10.1145\/586110.586128"},{"key":"4_CR7","unstructured":"Bellovin, S., Taylor, T.: ICMP Traceback Message, RFC 2026, Internet Engineering Task Force (2003)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Em Network ingress filtering: Defeating denial of service at-tacks which employ ip source address spoofing. In: RFC 2827 (2001)","DOI":"10.17487\/rfc2827"},{"key":"4_CR9","unstructured":"Cho, K., Kaizaki, R., Kato, A.: An Aggregation Technique for Traf.c Monitoring. In: IEEE Proceedings of the 2002 Symposium on Applications and the Internet (2002)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In: CCS 2003 (October 2003)","DOI":"10.1145\/948109.948116"},{"key":"4_CR11","unstructured":"Yih Huang, J., Pullen, M.: Countering Denial-of-Service Attacks Using Congestion Trig-gered Packet Sampling and Filtering (2001)"},{"key":"4_CR12","unstructured":"Sangpachatanaruk, C., Khattab, S.M., Znati, T., Melhem, R., Moss, D.: A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks (2002)"},{"key":"4_CR13","volume-title":"Intrusion Detection Using Neural Network and Support Vector Machine","author":"S. Mukkamala","year":"2002","unstructured":"Mukkamala, S., Janoski, G., Sung, A.H.: Intrusion Detection Using Neural Network and Support Vector Machine. IEEE, Los Alamitos (2002)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion Detection Using Ensemble of Soft Computing Paradigms (2004)","DOI":"10.1007\/978-3-540-44999-7_23"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590354_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:03Z","timestamp":1605643323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590354_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540305101","9783540322771"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11590354_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}