{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:17:31Z","timestamp":1743099451643,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540428800"},{"type":"electronic","value":"9783540456001"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45600-7_37","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T12:21:49Z","timestamp":1186834909000},"page":"340-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Quantifying Network Denial of Service: A Location Service Case Study"],"prefix":"10.1007","author":[{"given":"Yan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Adam","family":"Bargteil","sequence":"additional","affiliation":[]},{"given":"David","family":"Bindel","sequence":"additional","affiliation":[]},{"given":"Randy H.","family":"Katz","sequence":"additional","affiliation":[]},{"given":"John","family":"Kubiatowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"37_CR1","unstructured":"V. Almeida, et al. Characterizing reference locality in the WWW. In Proceeding of the IEEE Conf. on Parallel and Distributed Information Systems, 1996."},{"key":"37_CR2","unstructured":"J. Bayuk, Measuring Security, First workshop on information-security-system rating and ranking, 2001"},{"issue":"5","key":"37_CR3","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/2.841785","volume":"33","author":"L. Breslau","year":"2000","unstructured":"Lee Breslau, et al. Advances in network simulation. IEEE Computer, 33(5):59\u201367, May 2000.","journal-title":"IEEE Computer"},{"key":"37_CR4","unstructured":"A. Brown and D. Patterson, Towards availability benchmarks: A case study of software RAID systems. In Proceedings of the 2000 USENIX Conference."},{"key":"37_CR5","unstructured":"Y. Chen, A. Bargteil, R. Katz, and J. Kubiatowicz. Quantifying Network Denial of Service: A Location Service Case Study UCB Tech. Report UCB\/CSD-01-1150"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"S. Czerwinski, B. Zhao, T. Hodes, A. Joseph, and R. Katz. An architecture for a secure service discovery service. In Proceedings of ACM MOBICOM, August 1999.","DOI":"10.1145\/313451.313462"},{"key":"37_CR7","unstructured":"M. Delio New breed of attack zombies lurk, May 2001. http:\/\/www.wired.com\/news\/technology\/0,1282,43697,00.html."},{"key":"37_CR8","unstructured":"S. Dietrich, et al. Anaylzing distributed denial of service tools: the Shaft case. In Proceedings of the 14th Systems Administration Conference, 2000"},{"key":"37_CR9","unstructured":"V. Gligor. A note on the DoS problem. In Proceedings of the 1983 Symposium on Security and Privacy, 1983."},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"E. Guttman, C. Perkins, J. Veizades, and M. Day. Service Location Protocol, Version 2. IETF Internet Draft, November 1998. RFC 2165.","DOI":"10.17487\/rfc2608"},{"key":"37_CR11","unstructured":"J. Howard. An Analysis of Security Incidents on the Internet. PhD thesis, Carnegie Mellon University, Aug. 1998."},{"key":"37_CR12","unstructured":"T. Howes. The Lightweight Directory Access Protocol: X.500 Lite. Technical Report 95-8, Center for Information Technology Integration, U. Mich., July 1995."},{"key":"37_CR13","unstructured":"Computer Security Institute and Federal Bureau of Investigation. CSI\/FBI computer crime and security survey. In Computer Security Institute publication, 2000."},{"key":"37_CR14","unstructured":"J. Jannotti, et al. Overcast: Reliable multicasting with an overlay network. In 4th Symposium on Operating Systems Design & Implementation, Oct. 2000."},{"key":"37_CR15","unstructured":"C. Meadows. A formal framework and evaluation method for network denial of service. In Proc. of the IEEE Computer Security Foundations Workshop, 1999."},{"key":"37_CR16","unstructured":"J. Millen. DoS: A perspective. In Dependable Computing for Critical Applications4, 1995."},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"G. Plaxton, et al. Accessing nearby copies of replicated objects in a distributed environment. In Proceedings of SCP Symposium on Parallel Alg. and Arch., 1997.","DOI":"10.1145\/258492.258523"},{"key":"37_CR18","unstructured":"M. Rabinovich, et al. A dynamic object replication and migration protocol for an internet hosting service. In Proceedings of IEEE ICDCS, 1999."},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. to appear in Proceeding of ACM SIGCOMM, 2001.","DOI":"10.1145\/383059.383072"},{"key":"37_CR20","unstructured":"C. Schuba, I. Krsul, M. Kuhn, and et. al. Analysis of a DoS attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997."},{"key":"37_CR21","unstructured":"O. Spatscheck and L. Peterson. Defending against DoS attacks in Scout. In Proceedings of SOSP, 1999."},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"I. Stoica, et al. Chord: A scalable peer-to-peer lookup service for Internet applications. to appear in Proceedings of ACM SIGCOMM, 2001.","DOI":"10.1145\/383059.383071"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"C. Yu and V. Gligor. Specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6), June 1990.","DOI":"10.1109\/32.55087"},{"key":"37_CR24","unstructured":"E. Zegura, K. Calvert, and S. Bhattacharjee. How to model an internetwork. In Proceedings of IEEE Infocom, 1996."},{"key":"37_CR25","unstructured":"B. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for faulttolerant wide-area location and routing. UCB Tech. Report UCB\/CSD-01-1141."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45600-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T02:07:03Z","timestamp":1676686023000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/3-540-45600-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540428800","9783540456001"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-45600-7_37","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"24 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}