{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:24:56Z","timestamp":1759332296419},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_16","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"421-443","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks"],"prefix":"10.1007","author":[{"given":"Prachi","family":"Gulihar","sequence":"first","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046\u20132069.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-642-24037-9_57","volume-title":"Advances in parallel distributed computing","author":"A Srivastava","year":"2011","unstructured":"Srivastava, A., Gupta, B. B., Tyagi, A., Sharma, A., & Mishra, A. (2011). A recent survey on DDoS attacks and defense mechanisms. In Advances in parallel distributed computing (pp. 570\u2013580). Berlin: Springer."},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39\u201353.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"16_CR4","first-page":"915","volume-title":"Steps to reducing unwanted traffic on the internet workshop (SRUTI)","author":"K Xu","year":"2005","unstructured":"Xu, K., Zhang, Z.-L., & Bhattacharyya, S. (2005). Reducing unwanted traffic in a backbone network. In Steps to reducing unwanted traffic on the internet workshop (SRUTI) (p. 915). Berkeley, CA: USENIX Association."},{"key":"16_CR5","unstructured":"CERT Coordination Center. (2007, March). Denial of service attacks. Retrieved from \nhttp:\/\/www.cert.org\/techtips\/denialofservice.html"},{"issue":"4","key":"16_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L Garber","year":"2000","unstructured":"Garber, L. (2000). Denial-of-service attacks rip the internet. Computer, 33(4), 12\u201317.","journal-title":"Computer"},{"key":"16_CR7","unstructured":"CERT Coordination Center. (2007, March). CERT advisory CA-98.01 smurf IP denial-of- service attacks. Retrieved from \nhttp:\/\/www.cert.org\/advisories\/CA-1998-01.html"},{"key":"16_CR8","volume-title":"Passport: Secure and adoptable source authentication","author":"X Liu","year":"2008","unstructured":"Liu, X., Li, A., Yang, X., & Wetherall, D. (2008). Passport: Secure and adoptable source authentication. Renton, WA: USENIX."},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TNET.2008.2007431","volume":"17","author":"K Argyraki","year":"2009","unstructured":"Argyraki, K., & Cheriton, D. R. (2009). Scalable network-layer defense against internet bandwidth-flooding attacks. IEEE\/ACM Transactions on Networking (ToN), 17(4), 1284\u20131297.","journal-title":"IEEE\/ACM Transactions on Networking (ToN)"},{"key":"16_CR10","first-page":"195","volume-title":"ACM SIGCOMM computer communication review","author":"X Liu","year":"2008","unstructured":"Liu, X., Yang, X., & Lu, Y. (2008). To filter or to authorize: Network-layer DoS defense against multimillion-node botnets. In ACM SIGCOMM computer communication review (Vol. 38(4), pp. 195\u2013206). New York: ACM."},{"key":"16_CR11","unstructured":"Retrieved March 21, 2018, from \nhttps:\/\/www.calyptix.com\/top-threats\/ddos-attacks-101-types-targets-motivations\/"},{"key":"16_CR12","unstructured":"Retrieved March 21, 2018, from \nhttps:\/\/www.akamai.com\/us\/en\/about\/news\/press\/2017-press\/akamai-releases-third-quarter-2017-state-of-the-internet-security-report.jsp"},{"key":"16_CR13","unstructured":"Molsa, J. (2006). Mitigating denial of service attacks in computer networks. PhD thesis, Helsinki University of Technology, Espoo, Finland."},{"key":"16_CR14","unstructured":"Specht, S. M., & Lee, R. B. (2004). Distributed denial of service: Taxonomies of attacks, tools, and countermeasures. In ISCA PDCS (pp. 543\u2013550)."},{"issue":"3","key":"16_CR15","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V Paxson","year":"2001","unstructured":"Paxson, V. (2001). An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Computer Communication Review, 31(3), 38\u201347.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"10","key":"16_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"RK Chang","year":"2002","unstructured":"Chang, R. K. (2002). Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Communications Magazine, 40(10), 42\u201351.","journal-title":"IEEE Communications Magazine"},{"key":"16_CR17","unstructured":"CERT Coordination Center. (2007). CERT advisory CA-98.01 smurf IP denial-of-service attacks. Retrieved March, 2007, from \nhttp:\/\/www.cert.org\/advisories\/CA-1998.01.html"},{"key":"16_CR18","volume-title":"Mitigating denial of service attacks in computer networks","author":"J M\u00f6ls\u00e4","year":"2006","unstructured":"M\u00f6ls\u00e4, J. (2006). Mitigating denial of service attacks in computer networks. Espoo: Helsinki University of Technology."},{"issue":"4","key":"16_CR19","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046\u20132069.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"16_CR20","first-page":"275","volume-title":"Proceedings of the 14th International Conference on Computer Communications and Networks, ICCCN 2005","author":"R Chen","year":"2005","unstructured":"Chen, R., & Park, J. M. (2005). Attack diagnosis: Throttling distributed denial-of-service attacks close to the attack sources. In Proceedings of the 14th International Conference on Computer Communications and Networks, ICCCN 2005 (pp. 275\u2013280). Piscataway, NJ: IEEE."},{"key":"16_CR21","volume-title":"Technical Report TR ECE\u2014O6\u201302","author":"R Chen","year":"2006","unstructured":"Chen, R., Park, J. M., & Marchany, R. (2006). TRACK: A novel approach for defending against distributed denial-of-service attacks. In Technical Report TR ECE\u2014O6\u201302. Blacksburg, VA: Department of Electrical and Computer Engineering, Virginia Tech."},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/DISCEX.2003.1194868","volume-title":"Proceedings: DARPA information survivability conference and exposition, 2003","author":"C Papadopoulos","year":"2003","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., & Govindan, R. (2003). Cossack: Coordinated suppression of simultaneous attacks. In Proceedings: DARPA information survivability conference and exposition, 2003 (Vol. 1, pp. 2\u201313). Los Alamitos, CA: IEEE."},{"issue":"1","key":"16_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/972374.972382","volume":"34","author":"T Anderson","year":"2004","unstructured":"Anderson, T., Roscoe, T., & Wetherall, D. (2004). Preventing internet denial-of-service with capabilities. ACM SIGCOMM Computer Communication Review, 34(1), 39\u201344.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"16_CR24","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TNET.2008.2007431","volume":"17","author":"K Argyraki","year":"2009","unstructured":"Argyraki, K., & Cheriton, D. R. (2009). Scalable network-layer defense against internet bandwidth-flooding attacks. IEEE\/ACM Transactions on Networking (ToN), 17(4), 1284\u20131297.","journal-title":"IEEE\/ACM Transactions on Networking (ToN)"},{"key":"16_CR25","first-page":"195","volume-title":"ACM SIGCOMM Computer Communication Review","author":"X Liu","year":"2008","unstructured":"Liu, X., Yang, X., & Lu, Y. (2008). To filter or to authorize: Network-layer DoS defense against multimillion-node botnets. In ACM SIGCOMM Computer Communication Review (Vol. 38(4), pp. 195\u2013206). New York: ACM."},{"issue":"4","key":"16_CR26","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1145\/1151659.1159948","volume":"36","author":"MWM Vutukuru","year":"2006","unstructured":"Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Karger, D., & Shenker, S. (2006). DDoS defense by offense. In ACM SIGCOMM Computer Communication Review (Vol. 36(4), pp. 303\u2013314). New York: ACM.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"16_CR27","first-page":"54","volume-title":"Third International Conference on Networking and Services, 2007. ICNS","author":"J Yu","year":"2007","unstructured":"Yu, J., Li, Z., Chen, H., & Chen, X. (2007). A detection and offense mechanism to defend against application layer DDoS attacks. In Third International Conference on Networking and Services, 2007. ICNS (pp. 54\u201354). Piscataway, NJ: IEEE."},{"issue":"3","key":"16_CR28","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/571697.571724","volume":"32","author":"R Mahajan","year":"2002","unstructured":"Mahajan, R., Bellovin, S. M., Floyd, S., Ioannidis, J., Paxson, V., & Shenker, S. (2002). Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communication Review, 32(3), 62\u201373.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/986655.986658","volume-title":"Proceedings of the 2003 workshop on New security paradigms","author":"J Mirkovic","year":"2003","unstructured":"Mirkovic, J., Robinson, M., & Reiher, P. (2003). Alliance formation for DDoS defense. In Proceedings of the 2003 workshop on New security paradigms (pp. 11\u201318). New York: ACM."},{"key":"16_CR30","volume-title":"Passport: Secure and adoptable source authentication","author":"A Li","year":"2008","unstructured":"Li, A., Yang, X., & Wetherall, D. (2008). Passport: Secure and adoptable source authentication. Renton, WA: USENIX."},{"key":"16_CR31","first-page":"287","volume-title":"Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2","author":"S Kandula","year":"2005","unstructured":"Kandula, S., Katabi, D., Jacob, M., & Berger, A. (2005). Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2 (pp. 287\u2013300). Berkeley, CA: USENIX Association."},{"issue":"3","key":"16_CR32","first-page":"15","volume":"2","author":"M Srivatsa","year":"2008","unstructured":"Srivatsa, M., Iyengar, A., Yin, J., & Liu, L. (2008). Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Transactions on the Web (TWEB), 2(3), 15.","journal-title":"ACM Transactions on the Web (TWEB)"},{"key":"16_CR33","unstructured":"Hussain, A., Schwab, S., Thomas, R., Fahmy, S., & Mirkovic, J. (2006, June). DDoS experiment methodology. In Proceedings of DETER Community Workshop (pp. 8\u201314)."},{"key":"16_CR34","unstructured":"Ko, C., Hussain, A., Schwab, S., Thomas, R., & Wilson, B. (2006, June). Towards systematic IDS evaluation. In Proceedings of DETER Community Workshop (pp. 20\u201323)."},{"key":"16_CR35","volume-title":"The network press encyclopedia of networking","author":"W Feibel","year":"2000","unstructured":"Feibel, W. (2000). The network press encyclopedia of networking. San Francisco, CA: Sybex."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:05:13Z","timestamp":1577793913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_16","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}