{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:57Z","timestamp":1742913717657,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319171715"},{"type":"electronic","value":"9783319171722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17172-2_14","type":"book-chapter","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T03:04:26Z","timestamp":1429153466000},"page":"205-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DoS Amplification Attacks \u2013 Protocol-Agnostic Detection of Service Abuse in Amplifier Networks"],"prefix":"10.1007","author":[{"given":"Timm","family":"B\u00f6ttger","sequence":"first","affiliation":[]},{"given":"Lothar","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[]},{"given":"Felix","family":"von Eye","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Reiser","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"14_CR1","unstructured":"CloudFlare. \n                      https:\/\/www.cloudflare.com\/\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR2","unstructured":"\u00d6zavci, F.: VOIP Wars: Return of the SIP, DEFCON 21, August 2013. \n                      http:\/\/www.defcon.org\/images\/defcon-21\/dc-21-presentations\/Ozavci\/DEFCON-21-Ozavci-VoIP-Wars-Return-of-the-SIP-Updated.pdf\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (Best Current Practice), May 2000. \n                      http:\/\/www.ietf.org\/rfc\/rfc2827.txt\n                      \n                    , updated by RFC 3704","DOI":"10.17487\/rfc2827"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-540-89173-4_16","volume-title":"Critical Information Infrastructures Security","author":"G Kambourakis","year":"2008","unstructured":"Kambourakis, G., Moschos, T., Geneiatakis, D., Gritzalis, S.: Detecting DNS amplification attacks. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 185\u2013196. Springer, Heidelberg (2008)"},{"key":"14_CR5","unstructured":"nDPI-Homepage. \n                      http:\/\/www.ntop.org\/products\/ndpi\/\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR6","unstructured":"Direct NIC Access - Gigabit and 10 Gigabit Ethernet Line-Rate Packet Capture and Injection. \n                      http:\/\/www.ntop.org\/products\/pf_ring\/dna\/\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Postel, J.: Quote of the Day Protocol. RFC 865 (INTERNET STANDARD), May 1983. \n                      http:\/\/www.ietf.org\/rfc\/rfc865.txt","DOI":"10.17487\/rfc0865"},{"key":"14_CR8","unstructured":"Prince, M.: The DDoS That Almost Broke the Internet, March 2013. \n                      http:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR9","unstructured":"Rastegari, S., Saripan, M.I., Rasid, M.F.A.: Detection of Denial of Service Attacks against Domain Name System Using Neural Networks. International Journal of Computer Science Issues (IJCSI) 7(4) (2009)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Rossow, C.: Amplification hell: Revisiting network protocols for DDoS abuse. In: Proceedings of the 2014 Network and Distributed System Security (NDSS) Symposium, San Diego, CA, February 2014","DOI":"10.14722\/ndss.2014.23233"},{"key":"14_CR11","unstructured":"Soluk, K.: NTP ATTACKS: Welcome to The Hockey Stick Era, February 2014. \n                      http:\/\/www.arbornetworks.com\/asert\/2014\/02\/ntp-attacks-welcome-to-the-hockey-stick-era\/\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR12","unstructured":"Specht, S., Lee, R.: Distributed denial of service: Taxonomies of attacks, tool and countermeasures. In: Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, San Francisco, CA, September 2002"},{"key":"14_CR13","unstructured":"Spoofer Project: State of IP Spoofing. \n                      http:\/\/spoofer.cmand.org\/summary.php\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Sun, C., Liu, B., Shi, L.: Efficient and low-cost hardware defense against DNS amplification attacks. In: IEEE Global Telecommunications Conference (GLOBECOM 2008). IEEE (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.397"},{"key":"14_CR15","unstructured":"Vuze homepage. \n                      http:\/\/www.vuze.com\/\n                      \n                     (last accessed: December 2014)"},{"key":"14_CR16","unstructured":"zlib Homepage. \n                      http:\/\/www.zlib.net\/\n                      \n                     (last accessed: December 2014)"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17172-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T23:40:25Z","timestamp":1558309225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-17172-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319171715","9783319171722"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17172-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}