{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T02:40:39Z","timestamp":1736131239713,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308553"},{"type":"electronic","value":"9783540324249"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11599548_34","type":"book-chapter","created":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T14:44:08Z","timestamp":1133448248000},"page":"395-406","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation"],"prefix":"10.1007","author":[{"given":"Takayuki","family":"Furuya","sequence":"first","affiliation":[]},{"given":"Takahiro","family":"Matsuzaki","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Distributed Denial of Service (DDoS) Attacks\/tools, http:\/\/staff.washington.edu\/dittrich\/misc\/ddos\/"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Lau, F., Rubin, S.H., Smith, M.H., Trajovic, L.: Distributed Denial of Service Attacks. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, October 2000, pp. 2275\u20132280 (2000)","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"34_CR3","first-page":"301","volume-title":"Proceedings of the 15th International Information Security Conference (IFIP\/SEC 2000)","author":"J. Leiwo","year":"2000","unstructured":"Leiwo, J., Aura, T., Nikander, P.: Towards Network Denial of Service Resistant Protocols. In: Proceedings of the 15th International Information Security Conference (IFIP\/SEC 2000), August 2000, pp. 301\u2013310. Kluwer, Dordrecht (2000)"},{"issue":"5","key":"34_CR4","first-page":"972","volume":"83","author":"K. Matsuura","year":"2000","unstructured":"Matsuura, K., Imai, H.: Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks. IEICE Transactions on Information and Systems\u00a0E83-D(5), 972\u2013979 (2000)","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"2","key":"34_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review\u00a034(2), 39\u201354 (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Alifri, H.: Ip Traceback: A New Denial-Of-Service Deterrent? IEEE Security & Privacy\u00a01(3) (2003)","DOI":"10.1109\/MSECP.2003.1203219"},{"key":"34_CR7","unstructured":"Tupakula, U.K., Varadharajan, V.: A Practical Method to Counteract Denial of Service Attacks. In: Proceedings of the 26th Australasian Computer Science Conference (ACSC 2003), February 2003, vol.\u00a016 (2003)"},{"key":"34_CR8","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. Manuscript, ARC Special Research Center for Ultra-Broadband Information Networks"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2827 (May 2000)","DOI":"10.17487\/rfc2827"},{"issue":"2","key":"34_CR10","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D. Denning","year":"1987","unstructured":"Denning, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"34_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/65.730748","volume":"12","author":"M. Thottan","year":"1998","unstructured":"Thottan, M., Ji, C.: Proactive Anomaly Detection Using Distributed Intelligent Agents. IEEE Network\u00a012(5), 21\u201327 (1998)","journal-title":"IEEE Network"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A., Vigna, G.: Intrusion Detection: A Brief History and Overview. Supplement to IEEE Computer, Security & Privacy, 27\u201330 (2002)","DOI":"10.1109\/MC.2002.1012428"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Kr\u00fcgel, C., Toth, T., Kirda, E.: Service Specific Anomaly Detection for Network Intrusion Detection. In: Proceedings of the 2002 ACM Symposium on Applied Computing, March 2002, pp. 201\u2013208 (2002)","DOI":"10.1145\/508791.508835"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Siaterlis, C., Maglaris, B.: Towards Multisensor Data Fusion for DoS Detection. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 439\u2013446 (2004)","DOI":"10.1145\/967900.967992"},{"key":"34_CR15","unstructured":"Kulkarni, A.B., Bush, S.F., Evans, S.C.: Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Tech. Report, GE Research & Development Center, 2001CRD176 (Class 1) (December 2001)"},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory, pp. 144\u2013153. John Wiley & Sons, Inc, New York (1991)"},{"key":"34_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3860-5","volume-title":"An Introduction to Kolmogorov Complexity and Its Applications","author":"M. Li","year":"1993","unstructured":"Li, M., Vitanyi, P.: An Introduction to Kolmogorov Complexity and Its Applications. Springer, Berlin (1993)"},{"key":"34_CR18","unstructured":"Evans, S.C., et al.: Kolmogorov Complexity Estimation and Analysis. Tech. Report, GE Research & Development Center, 2002GRC177 (Class 1) (October 2002)"},{"key":"34_CR19","unstructured":"http:\/\/www.apache.org\/dyn\/closer.cgi"},{"key":"34_CR20","unstructured":"http:\/\/netgroup-serv.polito.it\/windump\/install\/Default.htm"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-Volume Network Intrusion Detection. In: Proceedings of the 11th ACM conference on Computer and Communications Security, October 2004, pp. 2\u201311 (2004)","DOI":"10.1145\/1030083.1030086"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Tongshen, H., Xiamin, Qingzhang, C., Kezhen, Y.: Design and Implement of Firewall-Log-Based Online Attack Detection System. In: Proceedings of the 3rd International Conference on Information Security (InfoSecu 2004), November 2004, pp. 146\u2013149 (2004)","DOI":"10.1145\/1046290.1046320"},{"key":"34_CR23","unstructured":"Mirkovic, J., et al.: A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Tech. Report, UCLA CSD, CSD-TR-020018 (2002)"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Cheung, S., Levitt, K.N.: Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. In: Proc. of New Security Paradigms Workshop 1997, September 1997, pp. 94\u2013106 (1997)","DOI":"10.1145\/283699.283744"},{"key":"34_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-540-39927-8_34","volume-title":"Information and Communications Security","author":"J. Sun","year":"2003","unstructured":"Sun, J., Jin, H., Chen, H., Zhang, Q., Han, Z.: A compound intrusion detection model. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 370\u2013381. Springer, Heidelberg (2003)"},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Xu, W., Wood, T., Trappe, W., Zhang, Y.: Wireless Monitoring and Denial of Service: Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. In: Proceedings of the 2004 ACM Workshop on Wireless Security, October 2004, pp. 80\u201389 (2004)","DOI":"10.1145\/1023646.1023661"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proceedings of the 10th International Conference on World Wide Web, pp. 514\u2013524 (2001)","DOI":"10.1145\/371920.372148"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Hussain, A., Heidemann, J., Papadopoulos, C.: Denial-of-Service: A Framework for Classifying Denial of Service Attacks. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2003, pp. 99\u2013110 (2003)","DOI":"10.1145\/863955.863968"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11599548_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T02:16:59Z","timestamp":1736129819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11599548_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308553","9783540324249"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11599548_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}