{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:26:12Z","timestamp":1725553572181},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340720"},{"type":"electronic","value":"9783540340744"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751588_91","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T13:53:45Z","timestamp":1147355625000},"page":"876-884","source":"Crossref","is-referenced-by-count":0,"title":["Inter-domain Security Management to Protect Legitimate User Access from DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Sung Ki","family":"Kim","sequence":"first","affiliation":[]},{"given":"Byoung Joon","family":"Min","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"91_CR1","doi-asserted-by":"crossref","unstructured":"Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing (March-April 2002)","DOI":"10.1109\/4236.991439"},{"key":"91_CR2","doi-asserted-by":"crossref","unstructured":"Belenky, A., Ansari, N.: On IP Traceback. IEEE Communications Magazine (July 2003)","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"91_CR3","doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: SIGCOMM, pp. 251\u2013262 (1999)","DOI":"10.1145\/316188.316229"},{"key":"91_CR4","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical Approaches to DDoS Attack Detection and Response. In: DISCEX (DARPA Information Survivability Conference and Exposition) (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"91_CR5","unstructured":"Ioannidis, J., Bellovin, S.: Implementing Pushback: Router-Based Defense Against DDoS Attacks. In: Proceedings of the Network and Distributed System Security Symposium (February 2002)"},{"key":"91_CR6","unstructured":"KICS of Korea Information Security Agency. Intercept and Analysis Technologies Against DDoS Attacks (September 2004)"},{"key":"91_CR7","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Characterization of Network-Wide Anomalies in Traffic Flows. In: IMC 2004 (October 2004)","DOI":"10.1145\/1028788.1028813"},{"key":"91_CR8","doi-asserted-by":"crossref","unstructured":"Mahajan, R., et al.: Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communications Review, 32(3) (July 2002)","DOI":"10.1145\/571697.571724"},{"key":"91_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-540-24591-9_14","volume-title":"Information Security Applications","author":"B.J. Min","year":"2004","unstructured":"Min, B.J., Kim, S.K., Choi, J.S.: Secure System Architecture Based on Dynamic Resource Reallocation. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 174\u2013187. Springer, Heidelberg (2004)"},{"key":"91_CR10","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Defending Against Distributed Denial of Services Attacks Using Selective Pushback. In: Proceedings of the 9th IEEE Int\u2019l Conference on Telecommunications (June 2002)"},{"key":"91_CR11","unstructured":"How to Get Rid of Denial of Service Attacks, \n                    \n                      http:\/\/www.bgpexpert.com"},{"key":"91_CR12","unstructured":"Unicast Reverse Path Forwarding(uRPF) Enhancements for the ISP-ISP Edge, \n                    \n                      ftp:\/\/ft-eng.cisco.com\/cons\/\/isp\/security\/URPF-ISP.pdf"},{"key":"91_CR13","unstructured":"Configuring BGP to Block Denial-of-Service Attacks, \n                    \n                      http:\/\/www.water.springs.org\/pub\/id\/draft-turk-bgp-dos-01.txt"},{"key":"91_CR14","unstructured":"Linux Advanced Routing and Traffic Control HOWTO, \n                    \n                      http:\/\/www.lartc.org\/lartc.html"},{"key":"91_CR15","unstructured":"Spread Toolkit, \n                    \n                      http:\/\/www.spread.org"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751588_91.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:59:19Z","timestamp":1619506759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751588_91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340720","9783540340744"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11751588_91","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}