{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:39:40Z","timestamp":1774993180542,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540317784","type":"print"},{"value":"9783540317791","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11663812_2","type":"book-chapter","created":{"date-parts":[[2006,1,20]],"date-time":"2006-01-20T12:57:08Z","timestamp":1137761828000},"page":"22-42","source":"Crossref","is-referenced-by-count":27,"title":["Empirical Analysis of Rate Limiting Mechanisms"],"prefix":"10.1007","author":[{"given":"Cynthia","family":"Wong","sequence":"first","affiliation":[]},{"given":"Stan","family":"Bielski","sequence":"additional","affiliation":[]},{"given":"Ahren","family":"Studer","sequence":"additional","affiliation":[]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Chen, S., Tang, Y.: Slowing down internet worms. In: Proceedings of 24th International Conference on Distributed Computing Systems, Tokyo, Japan (March 2004)","DOI":"10.1109\/ICDCS.2004.1281596"},{"key":"2_CR2","unstructured":"Collins, M., Reiter, M.: An empirical analysis of target-resident DoS filters. In: Proceedings of 2004 IEEE Symposium of Security and Privacy (2004)"},{"key":"2_CR3","volume-title":"Proceedings of the 2004 ACM workshop on Rapid Malcode","author":"D.R. Ellis","year":"2004","unstructured":"Ellis, D.R., Aiken, J.G., Attwood, K.S., Tenaglia, S.D.: A behavioral approach to worm detection. In: Proceedings of the 2004 ACM workshop on Rapid Malcode. ACM Press, New York (2004)"},{"key":"2_CR4","unstructured":"Ganger, G.R., Economou, G., Bielski, S.: Self-securing network interfaces: What, why and how, Carnegie Mellon University Technical Report CMU-CS-02-144 (August 2002)"},{"key":"2_CR5","unstructured":"Hogwash. Inline packet scrubber, http:\/\/sourceforge.net\/projects\/hogwah"},{"key":"2_CR6","unstructured":"Balakrishnan, H., Jung, J., Sit, E., Morris, R.: DNS performance and the effectiveness of caching. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop, San Francisco, California (November 2001)"},{"key":"2_CR7","unstructured":"Jung, J., Paxon, V., Berger, A.W., Balakrishman, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of 2004 IEEE Symposium on Security and Privacy (2004)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., White, S.: Directed-graph epidemiological models of computer viruses. In: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 1991, pp. 343\u2013359 (1991)","DOI":"10.1109\/RISP.1991.130801"},{"key":"2_CR9","unstructured":"Kim, H., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the 13th USENIX Security Symposium, San Diego, California, USA (August 2004)"},{"key":"2_CR10","unstructured":"Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: Proceedings of IEEE INFOCOM 2003, San Francisco, CA (April 2003)"},{"key":"2_CR11","unstructured":"Network-Associates (2003), http:\/\/vil.nai.com\/vil\/content\/v_100561.htm"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-540-30143-1_4","volume-title":"Recent Advances in Intrusion Detection","author":"S.E. Schechter","year":"2004","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 59\u201381. Springer, Heidelberg (2004)"},{"key":"2_CR13","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (December 2004)"},{"key":"2_CR14","unstructured":"Staniford, S.: Containment of scanning worms in enterprise networks. Journal of Computer Science (2004)"},{"key":"2_CR15","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to 0wn the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium (August 2002)"},{"key":"2_CR16","unstructured":"Symantec. W32.Blaster. Worm, http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.blaster.worm.html"},{"key":"2_CR17","unstructured":"Symantec. W32. Welchia. Worm, http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.welchia.worm.html"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/1015467.1015489","volume-title":"Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications","author":"H.J. Wang","year":"2004","unstructured":"Wang, H.J., Guo, C., Simon, D.R., Zugenmaier, A.: Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 193\u2013204. ACM Press, New York (2004)"},{"key":"2_CR19","unstructured":"Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: An eigenvalue viewpoint. In: Proceedings of the 22nd International Symposium on Reliable Distributed Systems (2003)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/948187.948198","volume-title":"Proceedings of the 2003 ACM workshop on Rapid Malcode","author":"Y. Wang","year":"2003","unstructured":"Wang, Y., Wang, C.: Modeling the effects of timing parameters on virus propagation. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 61\u201366. ACM Press, New York (2003)"},{"key":"2_CR21","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th USENIX Security Symposium (2004)"},{"key":"2_CR22","unstructured":"Whyte, D., Kranakis, E., van Oorschot, P.C.: DNS-based detection of scanning worms in an enterprise network. In: Proceedings of Network and Distributed System Security (2005)"},{"key":"2_CR23","unstructured":"Williamson, M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 2002)"},{"key":"2_CR24","volume-title":"Proceedings of the 2004 ACM workshop on Rapid Malcode","author":"C. Wong","year":"2004","unstructured":"Wong, C., Bielski, S., McCune, J., Wang, C.: A study of mass-mailing worms. In: Proceedings of the 2004 ACM workshop on Rapid Malcode. ACM Press, New York (2004)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Wong, C., Wang, C., Song, D., Bielski, S., Ganger, G.R.: Dynamic quarantine of internet worms. In: Proceedings of DSN 2004, Florence, Italy (June 2004)","DOI":"10.1109\/DSN.2004.1311878"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Zou, C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communication Security (November 2002)","DOI":"10.1145\/586110.586130"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11663812_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T08:24:55Z","timestamp":1736238295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11663812_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540317784","9783540317791"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11663812_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}