{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:10:21Z","timestamp":1736295021744,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_5","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"43-57","source":"Crossref","is-referenced-by-count":2,"title":["Low Rate DoS Attack to Monoprocess Servers"],"prefix":"10.1007","author":[{"given":"Gabriel","family":"Maci\u00e1-Fern\u00e1ndez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jes\u00fas E.","family":"D\u00edaz-Verdejo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pedro","family":"Garc\u00eda-Teodoro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Williams, M.: Ebay, amazon, buy.com hit by attacks, 02\/09\/00. IDG News Service (2000), http:\/\/www.nwfusion.com\/news\/2000\/0209attack.html"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review\u00a034(2) (April 2004)","DOI":"10.1145\/997150.997156"},{"key":"5_CR3","unstructured":"CERT Coordination Center, Denial of Service attacks, Available from: http:\/\/www.cert.org\/tech_tips\/denial_of_service"},{"key":"5_CR4","unstructured":"Computer Security Institute and Federal Bureau of Investigation, CSI\/FBI Computer crime and security survey 2001, CSI (March 2001), Available from : http:\/\/www.gocsi.com"},{"key":"5_CR5","unstructured":": Inferring Internet Denial of Service activity. In: Proceedings of the USENIX Security Symposium, Washington, DC, USA, pp. 9\u201322 (2001)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing, in RFC 2827 (2001)","DOI":"10.17487\/rfc2827"},{"key":"5_CR7","unstructured":"Global Incident analysis Center - Special Notice - Egress filtering. Available from: http:\/\/www.sans.org\/y2k\/egress.htm"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/6294.869381","volume":"2","author":"X. Geng","year":"2000","unstructured":"Geng, X., Whinston, A.B.: Defeating Distributed Denial of Service attacks. IEEE IT Professional\u00a02(4), 36\u201342 (2000)","journal-title":"IEEE IT Professional"},{"key":"5_CR9","unstructured":"Weiler, N.: Honeypots for Distributed Denial of Service. In: Proceedings of the Eleventh IEEE International Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises 2002, Pitsburgh, PA, USA, June 2002, pp. 109\u2013114 (2002)"},{"key":"5_CR10","unstructured":"Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University, Goteborg, Sweden. Technical Report 99-15 (March 2000)"},{"key":"5_CR11","unstructured":"Talpade, R.R., Kim, G., Khurana, S.: NOMAD: Traffic-based network monitoring framework for anomaly detection. In: Proceedings of the Fourth IEEE Symposium on Computers and Communications (1998)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Cabrera, J.B.D., Lewis, L., Qin, X., Lee, W., Prasanth, R.K., Ravichandran, B., Mehra, R.K.: Proactive detection of Distributed Denial of Service Attacks using MIB traffic variables - a feasibility study. In: Proceedings of the 7th IFIP\/IEEE Internation Symposium on Integrated Network Management, Seattle, WA, May 14-18 (2001)","DOI":"10.1109\/INM.2001.918069"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Prier, G., Reiher, P.: Attacking DDoS at the source. In: Proceedings of ICNP 2002, Paris, France, pp. 312\u2013321 (2002)","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"DDoS attacks and defense mechanisms: classification and state-of-the-art, in Computer Networks 44, 643-646 (2004)","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Kuzmanovic, A., Knightly, E.: Low Rate TCP-targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). In: Proc. ACM SIGCOMM 2003, August 2003, pp. 75\u201386 (2003)","DOI":"10.1145\/863955.863966"},{"key":"5_CR16","unstructured":"Sun, H., Lui, J.C.S., Yau, D.K.Y.: Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection. In: Proc. IEEE Conference on Network Protocols (ICNP 2004), October 2004, pp. 196\u2013205 (2004)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Yang, G., Gerla, M., Sanadidi, M.Y.: Randomization: Defense Against Low-rate TCP-targeted Denial-of-Service Attacks. In: Proc. IEEE Symposium on Computers and Communications, July 2004, pp. 345\u2013350 (2004)","DOI":"10.1109\/ISCC.2004.1358428"},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/LCOMM.2005.1413635","volume":"9","author":"A. Shevtekar","year":"2005","unstructured":"Shevtekar, A., Anantharam, K., Ansari, N.: Low Rate TCP Denial-of-Service Attack Detection at Edge Routers. IEEE Communications Letters\u00a09(4), 363\u2013365 (2005)","journal-title":"IEEE Communications Letters"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"SANS Institute. NAPTHA: A new type of Denial of Service Attack (December 2000), http:\/\/rr.sans.org\/threats\/naptha2.php","DOI":"10.1016\/S1353-4858(00)07003-3"},{"key":"5_CR20","volume-title":"Basic Traffic Analysis","author":"R.R. Martin","year":"1993","unstructured":"Martin, R.R.: Basic Traffic Analysis. Prentice-Hall Inc., Englewood Cliffs (1993)"},{"key":"5_CR21","unstructured":"http:\/\/mathworld.wolfram.com\/ExponentialDistribution.html"},{"key":"5_CR22","unstructured":"Network Simulator 2, Available at: http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:39:53Z","timestamp":1736293193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11734666_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}