{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:32:39Z","timestamp":1725564759349},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307679"},{"type":"electronic","value":"9783540322498"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596370_22","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T08:20:56Z","timestamp":1132820456000},"page":"249-250","source":"Crossref","is-referenced-by-count":0,"title":["A New Active DDoS Defense System Based on Automatic Learning"],"prefix":"10.1007","author":[{"given":"Junfeng","family":"Tian","sequence":"first","affiliation":[]},{"given":"Min","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall.: Network Support for IP Traceback. IEEE\/ACM Transactions on Networking\u00a09 (2001)","DOI":"10.1109\/90.929847"},{"key":"22_CR2","first-page":"70","volume-title":"The Technical Tutorial of Network Security","author":"X. Zhao","year":"2002","unstructured":"Zhao, X., Peng, Z., Wang, Y.: The Technical Tutorial of Network Security, pp. 70\u201372, 147-159. National Defence Industry Press, Bei\u2013Jing (2002)"},{"key":"22_CR3","unstructured":"Zhang, S., Dasgupta, P.: Hardened Networks. PHD Proposal, Arizona State University, Tempe (2002)"},{"key":"22_CR4","unstructured":"Steven, M., Bellovin.: ICMP Traceback Messages. In: Work in progress, Internet draft bellovin-itrace-2000 (2000)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Thomas, W., Doeppner, P., Klein, N., Andrew, K.: Using Router Stamping to Identify the Source of IP Packets. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 184\u2013189 (2000)","DOI":"10.1145\/352600.352627"},{"key":"22_CR6","unstructured":"Stefan, S., David, W., Anna, K., Tom, A.: Practical Network Support for IP Traceback. In: Proceedings of ACM SIGCOMM (2000)"},{"key":"22_CR7","volume-title":"Network Security Essentials-Applications and Standards","author":"S. William","year":"2002","unstructured":"William, S.: Network Security Essentials-Applications and Standards, 2nd edn. Tsing Hua Univercity Press, Bei-ing (2002)","edition":"2"},{"key":"22_CR8","unstructured":"Peluso, L., Cotroneo, D., Romano, S.P., Ventre, G.: An Active Security System against DoS Attacks (2001)"},{"key":"22_CR9","unstructured":"Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach. In: Featuring the Internet, 2nd edn. (2002)"},{"key":"22_CR10","first-page":"168","volume-title":"Neural Network Design","author":"T. Martin","year":"2002","unstructured":"Martin, T., Hagan, Howard, B., Demuth, M., Beale, H.: Neural Network Design, pp. 168\u2013196. China Machine Press, Bei-Jing (2002)"},{"key":"22_CR11","unstructured":"Katerina, Argyraki, David, R., Cheriton: Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In: USENIX 2005 Annual Technical Conference, pp. 135\u2013148 (2005)"},{"key":"22_CR12","unstructured":"David, K., Yau, Y., John, C., Lui, S., Liang, F., Yam, Y.: Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles. IEEE\/ACM Transaction on Networking (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science \u2013 ASIAN 2005. Data Management on the Web"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596370_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:55:06Z","timestamp":1619492106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596370_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307679","9783540322498"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11596370_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}