{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:08:01Z","timestamp":1747368481156,"version":"3.40.5"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928819","type":"print"},{"value":"9783031928826","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92882-6_16","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T14:33:49Z","timestamp":1747319629000},"page":"224-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAVA Deployment for\u00a0Spoofed Source Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8569-1354","authenticated-orcid":false,"given":"Wenjie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wenyong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","unstructured":"Chen, S., et\u00a0al.: Collaborative edge caching and dynamic bitrate adaptation for shvc-based vr video streaming. In: Proceedings of the IEEE Conference on Local Computer Networks (LCN), pp.\u00a01\u20139. IEEE, Daytona Beach (2024). https:\/\/doi.org\/10.1109\/LCN60385.2024.10639785","DOI":"10.1109\/LCN60385.2024.10639785"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Du, P., Nakao, A.: Ddos defense deployment with network egress and ingress filtering. In: Proceedings of the IEEE International Conference on Communications, pp.\u00a01\u20136. IEEE, Cape Town (2010). https:\/\/doi.org\/10.1109\/ICC.2010.5502654","DOI":"10.1109\/ICC.2010.5502654"},{"key":"16_CR3","volume-title":"Submodular Functions and Optimization","author":"S Fujishige","year":"2005","unstructured":"Fujishige, S.: Submodular Functions and Optimization, 2nd edn. Elsevier, Amsterdam (2005)","edition":"2"},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"He, X., Papadopoulos, C., Radoslavov, P.: A framework for incremental deployment strategies for router-assisted services. In: Proceedings of IEEE INFOCOM, pp. 1488\u20131498. IEEE, San Francisco (2003). https:\/\/doi.org\/10.1109\/INFCOM.2003.1208984","DOI":"10.1109\/INFCOM.2003.1208984"},{"issue":"3","key":"16_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIC.2023.3264319","volume":"27","author":"L Hui","year":"2023","unstructured":"Hui, L., et al.: Sav-d: defending ddos with incremental deployment of sav. IEEE Internet Comput. 27(3), 44\u201349 (2023). https:\/\/doi.org\/10.1109\/MIC.2023.3264319","journal-title":"IEEE Internet Comput."},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Korczy\u0144ski, M., Nosyk, Y.: Source address validation. In: Encyclopedia of Cryptography and Security, pp.\u00a01\u20138. Springer, Boston (2014). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_1626-1","DOI":"10.1007\/978-3-642-27739-9_1626-1"},{"issue":"3","key":"16_CR7","first-page":"500","volume":"38","author":"BY Liu","year":"2015","unstructured":"Liu, B.Y., Bi, J.: On the deployability evaluation model of internet inter-domain source address validation. Chin. J. Comput. 38(3), 500\u2013514 (2015)","journal-title":"Chin. J. Comput."},{"issue":"2","key":"16_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004). https:\/\/doi.org\/10.1145\/997150.997156","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Rossow, C.: Amplification hell: revisiting network protocols for ddos abuse. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 1\u201315. Internet Society, San Diego (2014). https:\/\/dud.inf.tu-dresden.de\/~strufe\/rn_lit\/rossow14amplification.pdf","DOI":"10.14722\/ndss.2014.23233"},{"key":"16_CR10","unstructured":"Ryba, F.J., et\u00a0al.: Amplification and drdos attack defense - a survey and new perspectives. arXiv preprint (2015). https:\/\/arxiv.org\/abs\/1505.07892"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Soliman, A.K., Salama, C., Mohamed, H.K.: Detecting dns reflection amplification ddos attack originating from the cloud. In: Proceedings of the 13th International Conference on Computer Engineering and Systems (ICCES), pp. 145\u2013150. IEEE, Cairo (2018). https:\/\/doi.org\/10.1109\/ICCES.2018.8639414","DOI":"10.1109\/ICCES.2018.8639414"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Vasques, A.T., Gondim, J.J.: Amplified reflection ddos attacks over iot mirrors: a saturation analysis. In: Proceedings of the Workshop on Communication Networks and Power Systems (WCNPS), pp.\u00a01\u20136. IEEE, Brasilia (2019). https:\/\/doi.org\/10.1109\/WCNPS.2019.8896290","DOI":"10.1109\/WCNPS.2019.8896290"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Wilder, B.: Equilibrium computation and robust optimization in zero sum games with submodular structure. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 817\u2013824. AAAI Press, New Orleans (2018). https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/11455","DOI":"10.1609\/aaai.v32i1.11455"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Wu, J., Bi, J., Bagnulo, M., Baker, F., Vogt, C.: Source address validation improvement (savi) framework. RFC 7039 (2013). https:\/\/www.rfc-editor.org\/rfc\/rfc7039","DOI":"10.17487\/rfc7039"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Wu, J., Bi, J., Li, X., Ren, G., Xu, K., Williams, M.: A source address validation architecture (sava) testbed and deployment experience. RFC 5210 (2008). https:\/\/www.rfc-editor.org\/rfc\/rfc5210","DOI":"10.17487\/rfc5210"},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"Wu, J., Ren, G., Li, X.: Source address validation: architecture and protocol design. In: Proceedings of the IEEE International Conference on Network Protocols, pp. 276\u2013283. IEEE, Beijing (2007). https:\/\/doi.org\/10.1109\/ICNP.2007.4375858","DOI":"10.1109\/ICNP.2007.4375858"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92882-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T15:04:28Z","timestamp":1747321468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92882-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928819","9783031928826"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92882-6_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}