{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:21:28Z","timestamp":1765887688897,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155081"},{"type":"electronic","value":"9783319155098"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_2","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"15-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Characterizing Optimal DNS Amplification Attacks and Effective Mitigation"],"prefix":"10.1007","author":[{"given":"Douglas C.","family":"MacFarland","sequence":"first","affiliation":[]},{"given":"Craig A.","family":"Shue","sequence":"additional","affiliation":[]},{"given":"Andrew J.","family":"Kalafut","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"2_CR1","unstructured":"Bright, P.: Spamhaus DDoS grows to Internet-threatening size, March 2013. http:\/\/arstechnica.com\/security\/2013\/03\/spamhaus-ddos-grows-to-internet-threatening-size\/"},{"key":"2_CR2","unstructured":"Center for Measurement and Analysis of Network Data, Naval Postgraduate School: Spoofer project: State of IP spoofing, February 2014. http:\/\/spoofer.cmand.org\/summary.php"},{"key":"2_CR3","unstructured":"CloudFlare: Cloudflare advanced ddos protection. https:\/\/www.cloudflare.com\/ddos"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Conrad, D.: Indicating resolver support of DNSSEC. IETF RFC 3225, December 2001","DOI":"10.17487\/rfc3225"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Damas, J., Neves, F.: Preventing use of recursive nameservers in reflector attacks. IETF RFC 5358, October 2008","DOI":"10.17487\/rfc5358"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Damas, J., Vixie, P.: Extension mechanisms for DNS (EDNS(0)). IETF RFC 6891, April 2013","DOI":"10.17487\/rfc6891"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Elz, R., Bush, R., Bradner, S., Patton, M.: Selection and operation of secondary dns servers. IETF RFC 2182, July 1997","DOI":"10.17487\/rfc2182"},{"key":"2_CR8","unstructured":"Incapsula Inc: 2013\u20132014 ddos threat landscape report, April 2014. http:\/\/www.imperva.com\/docs\/RPT_2013-2014_ddos_threat_landscape.pdf"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kalafut, A.J., Shue, C.A., Gupta, M.: Touring DNS open houses for trends and configurations. IEEE\/ACM Trans. Netw. PP(99), 1 (2011)","DOI":"10.1109\/TNET.2011.2130537"},{"key":"2_CR10","unstructured":"K\u00fchrer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? reducing the impact of amplification ddos attacks. In: USENIX Security Symposium (2014)"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V Paxson","year":"2001","unstructured":"Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput. Commun. Rev. 31(3), 38\u201347 (2001)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2_CR12","unstructured":"Prince, M.: Technical details behind a 400gbps NTP amplification DDoS attack, February 2014. http:\/\/blog.cloudflare.com\/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Rossow, C.: Amplification hell: Revisiting network protocols for DDoS abuse. In: Network and Distributed System Security (NDSS) Symposium (2014)","DOI":"10.14722\/ndss.2014.23233"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Shue, C., Kalafut, A.: Resolvers revealed: Characterizing DNS resolvers and their clients. ACM Trans. Internet Technol. (TOIT) 12(4), July 2013","DOI":"10.1145\/2499926.2499928"},{"key":"2_CR15","unstructured":"US-CERT: Smurf ip denial-of-service attacks. Advisory (CA-1998-01), January 1998. http:\/\/www.cert.org\/historical\/advisories\/CA-1998-01.cfm"},{"key":"2_CR16","unstructured":"US-CERT: Dns amplification attacks. Alert (TA13-088A), July 2013. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA13-088A"},{"key":"2_CR17","unstructured":"US-CERT: NTP amplification attacks using CVE-2013-5211. Alert (TA14-013A), January 2014"},{"key":"2_CR18","unstructured":"Vixie, P., Schryver, V.: Dns response rate limiting (DNS RRL), April 2012. http:\/\/ss.vix.su\/~vixie\/isc-tn-2012-1.txt"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T15:24:23Z","timestamp":1674833063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}