{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:36:04Z","timestamp":1758267364784},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_6","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T16:02:50Z","timestamp":1546012970000},"page":"102-121","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Lukaseder","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Maile","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Erb","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"6_CR1","unstructured":"Slowloris HTTP DoS, Jun 2009. http:\/\/ha.ckers.org\/slowloris\/ . Accessed 16 Dec 2017 via web.archive.org"},{"key":"6_CR2","unstructured":"Fayaz, S.K., Tobioka, Y., Sekar, V., Bailey, M.: Bohatei: flexible and elastic DDoS defense. In 24th USENIX Security Symposium (USENIX Security 15), pp. 817\u2013832. USENIX Association, Washington (2015)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Fielding, R., et al.: Hypertext Transfer Protocol - HTTP\/1.1. RFC 2616 (Draft Standard), June 1999","DOI":"10.17487\/rfc2616"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Hirakawa, T., Ogura, K., Bista, B.B., Takata, T.: A defense method against distributed slow HTTP DoS attack. In: 2016 19th International Conference on Network-Based Information Systems (NBiS), pp. 152\u2013158. IEEE (2016)","DOI":"10.1109\/NBiS.2016.58"},{"issue":"99","key":"6_CR5","first-page":"1","volume":"PP","author":"K Hong","year":"2017","unstructured":"Hong, K., Kim, Y., Choi, H., Park, J.: SDN-assisted slow HTTP DDoS attack defense method. IEEE Commun. Lett. PP(99), 1 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Jonker, M., Sperotto, A., van Rijswijk-Deij, R., Sadre, R., Pras, A.: Measuring the adoption of DDoS protection services. In: ACM IMC, pp. 279\u2013285. ACM, New York (2016)","DOI":"10.1145\/2987443.2987487"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Lukaseder, T., Hunt, A., Stehle, C., Wagner, D., van der Heijden, R., Kargl, F.: An extensible host-agnostic framework for SDN-assisted DDoS-mitigation. In: IEEE LCN, pp. 619\u2013622, October 2017","DOI":"10.1109\/LCN.2017.103"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Lukaseder, T., Maile, L., Kargl,F.: SDN-assisted network-based mitigation of slow HTTP attacks. In: 1. KuVS Fachgespr\u00e4ch Network Softwarization - From Research to Application. Universit\u00e4tsbibliothek T\u00fcbingen (2017)","DOI":"10.1007\/978-3-030-01704-0_6"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Moustis, D., Kotzanikolaou, P.: Evaluating security controls against HTTP-based DDoS attacks. In: Fourth International Conference on Information Intelligence Systems and Applications (IISA) (2013)","DOI":"10.1109\/IISA.2013.6623707"},{"key":"6_CR10","unstructured":"Park, J., Iwai, K., Tanaka, H., Kurokawa, T.: Analysis of slow read DoS attack. In: 2014 International Symposium on Information Theory and its Applications, pp. 60\u201364, October 2014"},{"key":"6_CR11","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-981-10-5281-1_38","volume-title":"Mobile and Wireless Technologies 2017","author":"S Tayama","year":"2018","unstructured":"Tayama, S., Tanaka, H.: Analysis of slow read DoS attack and communication environment. In: Kim, K.J., Joukov, N. (eds.) ICMWT 2017. LNEE, vol. 425, pp. 350\u2013359. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5281-1_38"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Tripathi, N., Hubballi, N., Singh,Y.: How secure are web servers? An empirical study of slow HTTP DoS attacks and detection. In: ARES, pp. 454\u2013463. IEEE (2016)","DOI":"10.1109\/ARES.2016.20"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Voron, J.-B., D\u00e9moulins, C., Kordon,F.: Adaptable intrusion detection systems dedicated to concurrent programs: a petri net-based approach, pp. 57\u201366. IEEE Computer Society, Washington (2010)","DOI":"10.1109\/ACSD.2010.32"},{"key":"6_CR14","unstructured":"Zdrnja, B.: Slowloris and Iranian DDoS attacks, Jun 2009. https:\/\/isc.sans.edu\/diary\/6622 . Accessed 16 Dec 2017"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:02:17Z","timestamp":1573624937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}