{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:56:40Z","timestamp":1725551800326},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308034"},{"type":"electronic","value":"9783540322962"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596042_127","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T15:14:40Z","timestamp":1132845280000},"page":"1255-1264","source":"Crossref","is-referenced-by-count":6,"title":["Intrusion Detection with CUSUM for TCP-Based DDoS"],"prefix":"10.1007","author":[{"given":"Fang-Yie","family":"Leu","sequence":"first","affiliation":[]},{"given":"Wei-Jie","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"127_CR1","unstructured":"Gibson, S.: DRDoS, Distributed Reflection Denial of Service, \n                      \n                        http:\/\/grc.com\/dos\/drdos.htm"},{"key":"127_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8163-9","volume-title":"Nonparametric Methods in Change-point Problems","author":"B.E. Brodsky","year":"1993","unstructured":"Brodsky, B.E., Darkhovsky, B.S.: Nonparametric Methods in Change-point Problems. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"127_CR3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2004.34","volume":"1","author":"H. Wang","year":"2004","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Change-Point Monitoring for the Detection of DoS Attacks. IEEE Transactions on Dependable and Secure Computing\u00a01, 193\u2013208 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"127_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"R.K.C. Chang","year":"2002","unstructured":"Chang, R.K.C.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Communications Magazine\u00a040, 42\u201351 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"127_CR5","unstructured":"Leu, F.Y., Hung, J.J., Hung, C.H.: UDAIDTS: Union Defense with Active Intrusion Detection and Hash-based Traceback System. In: Proceedings of International Conference on Information Management Conference, Taiwan (July 2003) (in Chinese)"},{"issue":"6","key":"127_CR6","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TNET.2002.804827","volume":"10","author":"A.C. Snoeren","year":"2002","unstructured":"Snoeren, A.C., et al.: Single-Packet IP Traceback. IEEE\/ACM Transaction on Network\u00a010(6), 721\u2013734 (2002)","journal-title":"IEEE\/ACM Transaction on Network"},{"key":"127_CR7","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MCOM.2003.1215651","volume":"41","author":"A. Belenky","year":"2003","unstructured":"Belenky, A., Ansar, N.: On IP traceback. IEEE Communications Magazine\u00a041, 142\u2013153 (2003)","journal-title":"IEEE Communications Magazine"},{"key":"127_CR8","doi-asserted-by":"crossref","unstructured":"Dawn Song, X.D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proceedings of 20th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a02, pp. 878\u2013886 (April 2001)","DOI":"10.1109\/INFCOM.2001.916279"},{"key":"127_CR9","unstructured":"Bellovin, S.M.: ICMP Traceback Messages. IETF draft, 2000(refer to in March 2005), \n                      \n                        http:\/\/www.research.att.com\/smb\/papers\/draftbellovinitrace-00.txt"},{"issue":"3","key":"127_CR10","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S. Savage","year":"2001","unstructured":"Savage, S., et al.: Network Support for IP Traceback. IEEE\/ACM Transaction on Network\u00a09(3), 226\u2013237 (2001)","journal-title":"IEEE\/ACM Transaction on Network"},{"key":"127_CR11","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN Flooding Attacks. In: Proceedings of IEEE Computer Communications, pp. 1530\u20131539 (June 2002)"},{"issue":"3","key":"127_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V. Paxson","year":"2001","unstructured":"Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of Service Attacks. Computer Communication Review\u00a031(3), 38\u201347 (2001)","journal-title":"Computer Communication Review"},{"key":"127_CR13","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Prier, G., Reiher, P.: Attacking DDoS at the Source. In: Proceedings of IEEE International Conference on Network Protocols, pp. 312\u2013321 (November 2002)","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"127_CR14","doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletter, M.: MULTOPS: A Data-Structure for Bandwidth Attack Detection. In: Proceedings of USENIX Security Symposium (August 2001)","DOI":"10.21236\/ADA401819"},{"key":"127_CR15","unstructured":"Leu, F.Y., Yang, W.J., Chang, W.K.: IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. In: Proceedings of the 11th International Conference on Parallel and Distributed Systems (July 2005)"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596042_127.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:53:31Z","timestamp":1619506411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596042_127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308034","9783540322962"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11596042_127","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}