{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:59:24Z","timestamp":1776783564878,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540383413","type":"print"},{"value":"9783540383437","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_24","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"327-342","source":"Crossref","is-referenced-by-count":17,"title":["Simulation of Internet DDoS Attacks and Defense"],"prefix":"10.1007","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Ulanov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"CAIDA, http:\/\/www.caida.org\/tools\/"},{"key":"24_CR2","unstructured":"Canonico, R., Cotroneo, D., Peluso, L., Romano, S.P., Ventre, G.: Programming routers to improve network security. In: Proceedings of the OPENSIG 2001 Workshop Next Generation Network Programming (2001)"},{"key":"24_CR3","doi-asserted-by":"crossref","first-page":"027103","DOI":"10.1103\/PhysRevE.71.027103","volume":"71","author":"M. Catanzaro","year":"2005","unstructured":"Catanzaro, M., Bogu\u00f1\u00e1, M., Pastor-Satorras, R.: Generation of uncorrelated random scalefree networks. Physical Review E 71, 027103 (2005)","journal-title":"Physical Review E"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Chen, S., Song, Q.: Perimeter-Based Defense against High Bandwidth DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems\u00a016(7) (2005)","DOI":"10.1109\/TPDS.2005.74"},{"key":"24_CR5","unstructured":"Dorogovtsev, S.N., Mendes, J.F.F.: The shortest path to complex networks (2004), http:\/\/ar-xiv.org\/abs\/cond-mat\/0404593"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Fan, X., Yen, J.: Modeling and Simulating Human Teamwork Behaviors Using Intelligent Agents. Journal of Physics of Life Reviews\u00a01(3) (2004)","DOI":"10.1016\/j.plrev.2004.10.001"},{"key":"24_CR7","unstructured":"FIPA, http:\/\/www.fipa.org"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletto, M.: MULTOPS: a data-structure for bandwidth attack detection. In: Proceedings of 10th Usenix Security Symposium (2001)","DOI":"10.21236\/ADA401819"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: An effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948116"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: An architecture for mitigating DDoS attacks. Journal on Selected Areas in Communications\u00a021 (2003)","DOI":"10.1109\/JSAC.2003.818807"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-36159-6_4","volume-title":"Information and Communications Security","author":"V. Kuznetsov","year":"2002","unstructured":"Kuznetsov, V., Sandstr\u00f6m, H., Simkin, A.: An evaluation of different IP traceback approaches. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 37\u201348. Springer, Heidelberg (2002)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Li, M., Chi, C.H., Zhao, W., Jia, W.J., Long, D.Y.: Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. Int. J. Information Technology and Decision Making\u00a02(3) (2003)","DOI":"10.1142\/S0219622003000720"},{"key":"24_CR13","unstructured":"Mahadevan, P., Krioukov, D., Fomenkov, M., Huffaker, B., Dimitropoulos, X., Claffy, K., Vahdat, A.: Lessons from Three Views of the Internet Topology: Technical Report. Coop-erative Association for Internet Data Analysis (CAIDA) (2005)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Bellovin, S.M., Floyd, S.: Controlling High Bandwidth Aggregates in the Network. Computer Communications Review\u00a032(3) (2002)","DOI":"10.1145\/571697.571724"},{"key":"24_CR15","unstructured":"Mirkovic, J., Martin, J., Reiher, P.: A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms, Technical report #020018. University of California, Los Angeles (2002)"},{"key":"24_CR16","volume-title":"Internet Denial of Service: Attack and Defense Mechanisms","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR, Englewood Cliffs (2004)"},{"key":"24_CR17","unstructured":"Mirkovic, J., Robinson, M., Reiher, P., Oikonomou, G.: Distributed Defense Against DDOS Attacks. University of Delaware. Technical Report CIS-TR-2005-02 (2005)"},{"key":"24_CR18","unstructured":"OMNeT++ homepage, http:\/\/www.omnetpp.org\/"},{"key":"24_CR19","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, I., Hussain, A., Govindan, R.: Cossack: Coordinated suppression of simultaneous attacks. In: Proceedings of DISCEX III (2003)"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Park, K., Lee, H.: On the Effectiveness of Route-based Packet Filtering For Distributed DoS Attack Prevention in Power-law Internet. In: Proceedings ACM SIGCOMM (2001)","DOI":"10.1145\/383059.383061"},{"key":"24_CR21","unstructured":"Peng, T., Christopher, L., Kotagiri, R.: Protection from Distributed Denial of Service Attack Using History-based IP Filtering. In: IEEE International Conference on Communications (2003)"},{"key":"24_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/978-3-540-24693-0_63","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"T. Peng","year":"2004","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 771\u2013782. Springer, Heidelberg (2004)"},{"key":"24_CR23","unstructured":"Route-Views Bibliography, http:\/\/www.routeviews.org\/papers\/"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Tambe, M.: Towards flexible teamwork. Journal of AI Research\u00a07 (1997)","DOI":"10.1613\/jair.433"},{"key":"24_CR25","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-47745-4_9","volume-title":"Multi-Agent Systems and Applications","author":"M. Tambe","year":"2001","unstructured":"Tambe, M., Pynadath, D.V.: Towards Heterogeneous Agent Teams. In: Luck, M., Ma\u0159\u00edk, V., \u0160t\u011bp\u00e1nkov\u00e1, O., Trappl, R. (eds.) ACAI 2001 and EASSS 2001. LNCS (LNAI), vol.\u00a02086, p. 187. Springer, Heidelberg (2001)"},{"key":"24_CR26","unstructured":"Xiang, Y., Zhou, W.: An Active Distributed Defense System to Protect Web Applications from DDoS Attacks. In: The Sixth International Conference on Information Integration and Web Based Application & Services (2004)"},{"key":"24_CR27","unstructured":"Xuan, D., Bettati, R., Zhao, W.: A gateway-based defense system for distributed dos attacks in high-speed networks. IEEE Transactions on Systems, Man, and Cybernetics (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T01:41:29Z","timestamp":1683596489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11836810_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}