{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:57:50Z","timestamp":1743141470586,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_273","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:33Z","timestamp":1319723433000},"page":"891-897","source":"Crossref","is-referenced-by-count":1,"title":["Overlay-Based DoS Defenses"],"prefix":"10.1007","author":[{"given":"Angelos","family":"Stavrou","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"273_CR1_273","unstructured":"Estonia recovers from massive denial-of-service attack (2007) by Jeremy Kirk, IDG News Service, 05\/17\/2007, (\n                  http:\/\/www.networkworld.com\/news\/2007\/051707-estonia-recovers-from-massive-denial-of-service.html\n                  \n                ).\u00a0Accessed 17 May 2007"},{"key":"273_CR2_273","unstructured":"Georgian websites forced offline in \u2018cyber war\u2019 (2008) by Asher Moses, The Sunday Morning Herald. (\n                  http:\/\/www.smh.com.au\/news\/technology\/georgian-websites-forced-offline-in-cyber-war\/2008\/08\/12\/1218306848654.html\n                  \n                ). Accessed 12 Aug 2008"},{"key":"273_CR3_273","unstructured":"Pro-Georgia blogger \u2018George\u2019 target of Twitter attack (2009) by Hilary Whiteman, CNN. (\n                  http:\/\/www.cnn.com\/2009\/TECH\/08\/07\/russia.georgia.twitter.attack\/index.html\n                  \n                ). Accessed 7 Aug 2009"},{"key":"273_CR4_273","first-page":"61","volume-title":"SOS: Secure Overlay Services","author":"AD Keromytis","year":"2002","unstructured":"Keromytis AD, Misra V, Rubenstein D (2002) SOS: Secure Overlay Services. In: Proceedings of ACM SIGCOMM, pp 61\u201372"},{"issue":"3","key":"273_CR5_273","first-page":"413","volume":"33","author":"AD Keromytis","year":"2004","unstructured":"Keromytis AD, Misra V, Rubenstein D (2004) SOS: an architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas of Communications (JSAC), 33(3):413\u2013426, 2004","journal-title":"IEEE Journal on Selected Areas of Communications (JSAC)"},{"key":"273_CR6_273","volume-title":"Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), 2003","author":"DG Andersen","year":"2003","unstructured":"Andersen DG (2003) Mayday: Distributed Filtering for Internet Services. In: Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), 2003"},{"key":"273_CR7_273","first-page":"37","volume":"1999","author":"SM Bellovin","year":"1999","unstructured":"Bellovin SM (1999) Distributed Firewalls; login: magazine, special issue on security, November 1999, pp 37\u201339","journal-title":"November"},{"key":"273_CR8_273","first-page":"190","volume-title":"Implementing a distributed firewall","author":"S Ioannidis","year":"2000","unstructured":"Ioannidis S, Keromytis AD, Bellovin S, Smith J (2000) Implementing a distributed firewall. In: Proceedings of Computer and Communications Security (CCS), pp 190\u2013199"},{"key":"273_CR9_273","doi-asserted-by":"crossref","unstructured":"Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Trans. Netw. 11, 1 (Feb. 2003), 17\u201332. DOI= \n                  http:\/\/dx.doi.org\/10.1109\/TNET.2002.808407","DOI":"10.1109\/TNET.2002.808407"},{"key":"273_CR10_273","first-page":"654","volume-title":"Proceedings of ACM Symposium on Theory of Computing (STOC)","author":"D Karger","year":"1997","unstructured":"Karger D, Lehman E, Leighton F, Panigrahy R, Levine M, Lewin D (1997) Consistent hashing and random trees: distributed caching protocols for relievig hot spots on the World Wide Web, In: Proceedings of ACM Symposium on Theory of Computing (STOC), pp 654\u2013663"},{"key":"273_CR11_273","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/948109.948114","volume-title":"Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS)","author":"WG Morein","year":"2003","unstructured":"Morein WG, Stavrou A, Cook DL, Keromytis AD, Misra V, Rubenstein D (2003) Using graphic turing tests to counter automated DDoS attacks against web servers. In: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), pp 8\u201319"},{"key":"273_CR12_273","doi-asserted-by":"crossref","unstructured":"Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D (2005) Websos: an overlay-based system for protecting web servers from denial of service attacks. J Commun Netw 48(5)","DOI":"10.1016\/j.comnet.2005.01.005"},{"key":"273_CR13_273","volume-title":"CAPTCHA: using hard AI problems for security","author":"L von Ahn","year":"2003","unstructured":"von Ahn L, Blum M, Hopper NJ, Langford J (2003) CAPTCHA: using hard AI problems for security. In: Proceedings of EUROCRYPT"},{"key":"273_CR14_273","unstructured":"CCITT, X.509 (1989) The directory authentication framework, International Telecommunications Union, Geneva"},{"key":"273_CR15_273","volume-title":"Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)","author":"DG Andersen","year":"2005","unstructured":"Andersen DG, Balakrishnan H, Frans Kaashoek M, Rao RN (2005) Improving Web Availability for Clients with MONET. In: Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"273_CR16_273","first-page":"81","volume-title":"Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS)","author":"A Stavrou","year":"2005","unstructured":"Stavrou A, Keromytis AD, Nieh J, Misra V, Rubenstein D (2005) MOVE: an end-to-end solution to network denial of service. In: Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), pp 81\u201396"},{"key":"273_CR17_273","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/1060289.1060323","volume-title":"Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)","author":"S Osman","year":"2002","unstructured":"Osman S, Subhraveti D, Su G, Nieh J (2002) The design and implementation of zap: a system for migrating computing environments. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), pp 361\u2013376"},{"key":"273_CR18_273","first-page":"75","volume-title":"Low-Rate TCP-targeted denial of service attacks","author":"A Kuzmanovic","year":"2003","unstructured":"Kuzmanovic A, Knightly EW (2003) Low-Rate TCP-targeted denial of service attacks. In: Proceedings of ACM SIGCOMM, pp 75\u201386"},{"key":"273_CR19_273","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/1102120.1102153","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)","author":"A Stavrou","year":"2005","unstructured":"Stavrou A, Keromytis AD (2005) Countering DoS attacks with stateless multipath Overlays. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pp 249\u2013259"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:04:28Z","timestamp":1591056268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_273","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}