{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:44Z","timestamp":1726037324205},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_22","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"289-296","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates"],"prefix":"10.1007","author":[{"given":"Tasnuva","family":"Mahjabin","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"12","key":"22_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147717741463","volume":"13","author":"T Mahjabin","year":"2017","unstructured":"Mahjabin, T., Xiao, Y., Sun, G., Jiang, W.: A survey of distributed denial-of-service attack, prevention, andmitigation techniques. Int. J. Distrib. Sens. Netw. 13(12), 1\u201333 (2017)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"22_CR2","unstructured":"Zeifman, I., Margolius, D.: The long and short of TTL \u2013 understanding DNS redundancy and the Dyn DDoS attack. \n                    https:\/\/www.incapsula.com\/blog\/the-long-and-short-of-ttl-the-ddos-perspective.html\n                    \n                  . Accessed 18 June 2018"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.procs.2012.06.060","volume":"10","author":"N Vlajic","year":"2012","unstructured":"Vlajic, N., Andrade, M., Nguyen, U.T.: The role of DNS TTL values in potential DDoS attacks: what do the major banks know about it? Procedia Comput. Sci. 10, 466\u2013473 (2012)","journal-title":"Procedia Comput. Sci."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Mahjabin, T., Xiao, Y.: Mitigation process for DNS flood attacks. In: Proceeding of 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas (Short Paper), 11\u201314 January 2019","DOI":"10.1109\/CCNC.2019.8651715"},{"issue":"11","key":"22_CR5","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1016\/j.comnet.2005.06.016","volume":"50","author":"H Shang","year":"2006","unstructured":"Shang, H., Wills, C.E.: Piggybacking related domain names to improve DNS performance. Comput. Netw. 50(11), 1733\u20131748 (2006)","journal-title":"Comput. Netw."},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/MCOM.2006.1637956","volume":"44","author":"H Chen","year":"2006","unstructured":"Chen, H., Xiao, Y.: Cache access and replacement for future wireless internet. IEEE Commun. Mag. 44, 113\u2013123 (2006)","journal-title":"IEEE Commun. Mag."},{"issue":"8","key":"22_CR7","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1109\/TMC.2006.119","volume":"5","author":"Y Xiao","year":"2006","unstructured":"Xiao, Y., Chen, H.: Optimal callback with two-level adaptation for wireless data access. IEEE Trans. Mob. Comput. 5(8), 1087\u20131102 (2006)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Wei-min, L., Lu-ying, C., Zhen-ming, L.: Alleviating the impact of DNS DDoS attacks. In: Second International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 1, pp. 240\u2013243. IEEE, April 2010","DOI":"10.1109\/NSWCTC.2010.63"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P.: Mitigating DNS DoS attacks. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 189\u2013198. ACM, October 2008","DOI":"10.1145\/1455770.1455796"},{"issue":"5","key":"22_CR10","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TNET.2002.803905","volume":"10","author":"J Jung","year":"2002","unstructured":"Jung, J., Sit, E., Balakrishnan, H., Morris, R.: DNS performance and the effectiveness of caching. IEEE\/ACM Trans. Networking 10(5), 589\u2013603 (2002)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"6","key":"22_CR11","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/S1389-1286(02)00424-3","volume":"41","author":"E Cohen","year":"2003","unstructured":"Cohen, E., Kaplan, H.: Proactive caching of DNS records: addressing a performance bottleneck. Comput. Netw. 41(6), 707\u2013726 (2003)","journal-title":"Comput. Netw."},{"key":"22_CR12","unstructured":"Cao, P., Irani, S.: Cost-aware WWW proxy caching algorithms. In: USENIX Symposium on Internet Technologies and Systems, vol. 12, no. 97, pp. 193\u2013206 (1997)"},{"issue":"4","key":"22_CR13","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/JCN.2009.6391355","volume":"11","author":"B Jang","year":"2009","unstructured":"Jang, B., Lee, D., Chon, K., Kim, H.: DNS resolution with renewal using piggyback. J. Commun. Netw. 11(4), 416\u2013427 (2009)","journal-title":"J. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:06:35Z","timestamp":1562771195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}