{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:04:17Z","timestamp":1766484257863,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031514753"},{"type":"electronic","value":"9783031514760"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51476-0_2","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:02:29Z","timestamp":1704870149000},"page":"23-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Peering into\u00a0the\u00a0Darkness: The Use of\u00a0UTRS in\u00a0Combating DDoS Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0556-1742","authenticated-orcid":false,"given":"Radu","family":"Anghel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6553-5662","authenticated-orcid":false,"given":"Swaathi","family":"Vetrivel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4976-4311","authenticated-orcid":false,"given":"Elsa Turcios","family":"Rodriguez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1706-7529","authenticated-orcid":false,"given":"Kaichi","family":"Sameshima","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2155-2667","authenticated-orcid":false,"given":"Daisuke","family":"Makita","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-8631","authenticated-orcid":false,"given":"Katsunari","family":"Yoshioka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4699-3007","authenticated-orcid":false,"given":"Carlos","family":"Ga\u00f1\u00e1n","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9116-0728","authenticated-orcid":false,"given":"Yury","family":"Zhauniarovich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"2_CR1","unstructured":"RIR Statistics. https:\/\/www.nro.net\/about\/rirs\/statistics\/"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Alieyan, K., Kadhum, M.M., Anbar, M., Rehman, S.U., Alajmi, N.K.: An overview of DDoS attacks based on DNS. In: 2016 International Conference on Information and Communication Technology Convergence (ICTC), pp. 276\u2013280. IEEE (2016)","DOI":"10.1109\/ICTC.2016.7763485"},{"key":"2_CR3","unstructured":"AMSIX: Pricing | AMS-IX Amsterdam (2023). https:\/\/www.ams-ix.net\/ams\/pricing"},{"key":"2_CR4","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ Security 17), pp. 1093\u20131110 (2017)"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2012.52","volume":"10","author":"M Bailey","year":"2012","unstructured":"Bailey, M., Dittrich, D., Kenneally, E., Maughan, D.: The Menlo report. IEEE Secur. Priv. 10(2), 71\u201375 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR6","unstructured":"CAIDA: AS Rank. https:\/\/asrank.caida.org\/"},{"key":"2_CR7","unstructured":"Cymru, T.: network-security-templates\/README.md at master $$\\cdot $$ team-cymru\/network-security-templates $$\\cdot $$ GitHub (2022)"},{"key":"2_CR8","unstructured":"DE-CIX: Blackholing - Fight DDoS attacks effectively. https:\/\/de-cix.net\/en\/services\/blackholing"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Dietzel, C., Wichtlhuber, M., Smaragdakis, G., Feldmann, A.: Stellar: network attack mitigation using advanced blackholing. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies. CoNEXT 2018, pp. 152\u2013164, New York, NY, USA. Association for Computing Machinery (2018). https:\/\/doi.org\/10.1145\/3281411.3281413, https:\/\/doi.org\/10.1145\/3281411.3281413","DOI":"10.1145\/3281411.3281413"},{"key":"2_CR10","unstructured":"Dnsfilter: Beyond Hackers in Hoodies: DNSFilter Mid-Year Cybersecurity Review (2022)"},{"key":"2_CR11","unstructured":"Equinix: Remotely Triggered Black Hole. https:\/\/docs.equinix.com\/en-us\/Content\/Interconnection\/IX\/IX-rtbh-guide.htm"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A., Berger, A.: Inferring BGP blackholing activity in the internet. In: Proceedings of the 2017 Internet Measurement Conference. IMC 2017, New York, NY, USA, pp. 1\u201314. Association for Computing Machinery (2017). https:\/\/doi.org\/10.1145\/3131365.3131379","DOI":"10.1145\/3131365.3131379"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Jonker, M., Pras, A., Dainotti, A., Sperotto, A.: A first joint look at DoS attacks and BGP blackholing in the wild. In: Proceedings of the Internet Measurement Conference 2018, pp. 457\u2013463 (2018)","DOI":"10.1145\/3278532.3278571"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Jonker, M., Sperotto, A.: Measuring exposure in DDoS protection services. In: 2017 13th International Conference on Network and Service Management (CNSM), pp. 1\u20139. IEEE (2017)","DOI":"10.23919\/CNSM.2017.8255991"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-030-72582-2_17","volume-title":"Passive and Active Measurement","author":"D Kopp","year":"2021","unstructured":"Kopp, D., Dietzel, C., Hohlfeld, O.: DDoS never dies? An IXP perspective on DDoS amplification attacks. In: Hohlfeld, O., Lutu, A., Levin, D. (eds.) PAM 2021. LNCS, vol. 12671, pp. 284\u2013301. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72582-2_17"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Kr\u00e4mer, L., et al.: AmpPot: monitoring and defending against amplification DDoS attacks. In: Proceedings of the 18th International Symposium Research in Attacks, Intrusions, and Defenses, pp. 615\u2013636 (2015)","DOI":"10.1007\/978-3-319-26362-5_28"},{"key":"2_CR17","unstructured":"Kristoff, J.: An Internet-wide BGP RTBH service. Technical report (June 2015). https:\/\/www.iab.org\/wp-content\/IAB-uploads\/2015\/04\/CARIS_2015_submission_20.pdf"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Krupp, J., Backes, M., Rossow, C.: Identifying the scan and attack infrastructures behind amplification DDoS attacks. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1426\u20131437 (2016)","DOI":"10.1145\/2976749.2978293"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Lone, Q., Frik, A., Luckie, M., Korczynski, M., van Eeten, M., Ga\u00f1\u00e1n, C.: Deployment of source address validation by network operators: a randomized control trial. In: Proceedings of the 43rd IEEE Symposium on Security and Privacy (S &P 2022) (2022)","DOI":"10.1109\/SP46214.2022.9833701"},{"issue":"2","key":"2_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Nawrocki, M., Blendin, J., Dietzel, C., Schmidt, T.C., W\u00e4hlisch, M.: Down the black hole: dismantling operational practices of BGP blackholing at IXPs. In: Proceedings of the Internet Measurement Conference, pp. 435\u2013448 (2019)","DOI":"10.1145\/3355369.3355593"},{"key":"2_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-642-24037-9_57","volume-title":"Advances in Parallel Distributed Computing","author":"A Srivastava","year":"2011","unstructured":"Srivastava, A., Gupta, B.B., Tyagi, A., Sharma, A., Mishra, A.: A recent survey on DDoS attacks and defense mechanisms. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds.) PDCTA 2011. CCIS, vol. 203, pp. 570\u2013580. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24037-9_57"},{"key":"2_CR23","unstructured":"Team Cymru: Unwanted traffic removal service. https:\/\/www.team-cymru.com\/ddos-mitigation-services"},{"key":"2_CR24","unstructured":"Team Cymru: UTRS Peering Guide. https:\/\/github.com\/team-cymru\/network-security-templates\/blob\/master\/UTRS-Peering-Guide\/README.md"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Turk, D.: Configuring BGP to Block Denial-of-Service Attacks. RFC 3882 (2004). https:\/\/doi.org\/10.17487\/RFC3882, https:\/\/rfc-editor.org\/rfc\/rfc3882.txt","DOI":"10.17487\/RFC3882"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Zhauniarovich, Y., Dodia, P.: Sorting the garbage: filtering out DRDoS amplification traffic in ISP networks. In: Proceedings of the IEEE Conference on Network Softwarization, pp. 142\u2013150 (2019)","DOI":"10.1109\/NETSOFT.2019.8806653"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51476-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:02:49Z","timestamp":1704870169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51476-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514753","9783031514760"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51476-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}