{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:58:07Z","timestamp":1740099487097,"version":"3.37.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030304393"},{"type":"electronic","value":"9783030304409"}],"license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-30440-9_21","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T02:13:03Z","timestamp":1567563183000},"page":"219-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["OSAA: On-Demand Source Authentication and Authorization in the Internet"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5161-4622","authenticated-orcid":false,"given":"Bart\u0142omiej","family":"Dabi\u0144ski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"key":"21_CR1","unstructured":"ISO\/IEC: International Standard 27000. Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Overview and vocabulary (2016)"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1109\/COMST.2015.2457491","volume":"17","author":"N Hoque","year":"2015","unstructured":"Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutorials 17(4), 2242\u20132270 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"21_CR3","unstructured":"Akamai Technologies: State of the Internet\/Security Report. Q1 2017 (2017)"},{"key":"21_CR4","unstructured":"NETSCOUT Systems: NETSCOUT\u2019s 14th Annual Worldwide Infrastructure Security Report (2018)"},{"key":"21_CR5","unstructured":"Imperva: The Top 10 DDoS Attack Trend (2015)"},{"key":"21_CR6","unstructured":"Argyraki, K., Cheriton, D.: Network capabilities: the good, the bad and the ugly. In: Proceedings of the ACM Workshop on Hot Topics in Networks, College Park, ACM (2005)"},{"key":"21_CR7","unstructured":"IETF: RFC 2827 - Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing (2000)"},{"key":"21_CR8","unstructured":"Cisco Systems: Characterizing and Tracing Packet Floods Using Cisco Routers. \n                    http:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security-vpn\/kerberos\/13609-22.html\n                    \n                  . Accessed 02 May 2019"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Shokri, R., Varshovi, A., Mohammadi, H.: DDPM: Dynamic Deterministic Packet Marking for IP traceback. In: 14th IEEE International Conference on Networks. IEEE, Singapore (2006)","DOI":"10.1109\/ICON.2006.302640"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, ACM, Stockholm (2000)","DOI":"10.1145\/347059.347560"},{"key":"21_CR11","unstructured":"Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings on Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2001. IEEE, Anchorage (2002)"},{"key":"21_CR12","unstructured":"Yaar, A., Perrig, A., Song, D.: Pi: a path identification mechanism to defend against DDoS attacks. In: Proceedings of the Symposium on Security and Privacy. IEEE, Berkeley (2003)"},{"key":"21_CR13","unstructured":"IETF: RFC 3882 - Configuring BGP to Block Denial-of-Service Attacks (2004)"},{"key":"21_CR14","unstructured":"IETF: RFC 1633 - Integrated Services in the Internet Architecture: an Overview (1994)"},{"key":"21_CR15","unstructured":"IETF: RFC 2474 - Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers (1998)"},{"key":"21_CR16","unstructured":"Ioannidis, J., Bellovin, S.: Implementing pushback: router-based defense against DDoS attacks. In: Network and Distributed System Security Symposium. Proceedings, Internet Society, San Diego (2002)"},{"issue":"1","key":"21_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/972374.972382","volume":"34","author":"T Anderson","year":"2004","unstructured":"Anderson, T., Roscoe, T., Wetherall, D.: Preventing Internet denial-of-service with capabilities. ACM SIGCOMM Comput. Commun. Rev. 34(1), 39\u201344 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"21_CR18","unstructured":"Yaar, A., Perrig, A., Song, D.: SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Berkeley (2004)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Natu, M., Mirkovic, J.: Fine-grained capabilities for flooding DDoS defense using client reputations. In: Proceedings of the 2007 Workshop on Large Scale Attack Defense. ACM, Kyoto (2007)","DOI":"10.1145\/1352664.1352668"},{"issue":"4","key":"21_CR20","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/1282427.1282413","volume":"37","author":"B Parno","year":"2007","unstructured":"Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B., Hu, Y.C.: Portcullis: protecting connection setup from denial-of-capability attacks. ACM SIGCOMM Comput. Commun. Rev. 37(4), 289\u2013300 (2007)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Wang, L., Wu, Q., Dung, L.D.: Engaging edge networks in preventing and mitigating undesirable network traffic. In: 3rd IEEE Workshop on Secure Network Protocols. IEEE, Beijing (2007)","DOI":"10.1109\/NPSEC.2007.4371617"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Kambhampati, V., Papadopoulos, C., Massey, D.: A taxonomy of capabilities based DDoS defense architectures. In: 9th IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA). IEEE, Sharm El-Sheikh (2011)","DOI":"10.1109\/AICCSA.2011.6126615"},{"key":"21_CR23","unstructured":"FAQ: Certification \u2013 RIPE Network Coordination Centre. \n                    https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/faq\/certification\n                    \n                  . Accessed 05 Oct 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30440-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T02:22:53Z","timestamp":1567563773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30440-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"ISBN":["9783030304393","9783030304409"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30440-9_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Architecture and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wroc\u0142aw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isat.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}