{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:22:11Z","timestamp":1765887731136,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_18","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"179-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Investigation of DDoS Attacks by Hybrid Simulation"],"prefix":"10.1007","author":[{"given":"Yana","family":"Bekeneva","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantin","family":"Borisenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrey","family":"Shorov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"18_CR1","unstructured":"Worldwide Infrastructure Security Report. ARBOR Networks reports 2014 (2014). \n                      http:\/\/www.arbornetworks.com\/resources\/infrastructure-security-report"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1134\/S1064230712060044","volume":"52","author":"A Konovalov","year":"2013","unstructured":"Konovalov, A., Kotenko, I., Shorov, A.: Simulation-based study of botnets and defense mechanisms against them. J. Comput. Syst. Sci. Int. 52(1), 43\u201365 (2013). Pleiades Publishing Ltd","journal-title":"J. Comput. Syst. Sci. Int."},{"key":"18_CR3","unstructured":"Kotenko, I., Konovalov, A., Shorov, A.: Agent-based modeling and simulation of botnets and botnet defense. In: Conference on Cyber Conflict, Proceedings 2010. CCD COE Publications. Tallinn, Estonia (2010)"},{"key":"18_CR4","unstructured":"Wang, J., Phan, R., Whitley, J., Parish, D.: Advanced DDoS attacks traffic simulation with a test center platform. Int. J. Inf. Secur. Res. (IJISR), 1(4) (2011)"},{"key":"18_CR5","unstructured":"Spirent TestCenter. \n                      http:\/\/www.spirent.com\/Ethernet_Testing\/Software\/TestCenter"},{"key":"18_CR6","unstructured":"MazeBolt developer. \n                      https:\/\/mazebolt.com"},{"key":"18_CR7","unstructured":"Butler, B.: Interop network squares off against controlled 70G bit\/sec DDoS attack (2013). \n                      http:\/\/www.networkworld.com\/article\/2166091\/data-center\/interop-network-squares-off-against-controlled-70g-bit-sec-ddos-attack.html"},{"key":"18_CR8","unstructured":"About Ixia. \n                      http:\/\/www.ixiacom.com\/about-us\/company"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"\u00c5rnes, A., Haas, P., Vigna, G., Kemmerer, R.A.: Using a virtual security testbed for digital forensic reconstruction. DIMVA 2006, pp. 144\u2013163. Springer-Verlag, France (2006)","DOI":"10.1007\/11790754_9"},{"key":"18_CR10","unstructured":"OMNeT\u00a0++\u00a0Discrete Event System Simulator. \n                      http:\/\/www.omnetpp.org\/intro"},{"key":"18_CR11","unstructured":"INET Framework. \n                      http:\/\/inet.omnetpp.org\/"},{"key":"18_CR12","unstructured":"ReaSE, developer web-site. \n                      https:\/\/i72projekte.tm.uka.de\/trac\/ReaSE"},{"key":"18_CR13","unstructured":"VirtualBox, developer site. \n                      https:\/\/www.virtualbox.org\/wiki\/Technical_documentation"},{"key":"18_CR14","unstructured":"VMware, developer site. \n                      www.vmware.com"},{"issue":"3","key":"18_CR15","first-page":"14","volume":"5","author":"I Kotenko","year":"2014","unstructured":"Kotenko, I., Doynikova, E.: Evaluation of computer network security based on attack graphs and security event processing. J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(3), 14\u201329 (2014)","journal-title":"J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"2","key":"18_CR16","first-page":"41","volume":"6","author":"A Fedorchenko","year":"2015","unstructured":"Fedorchenko, A., Kotenko, I., Chechulin, A.: Integrated repository of security information for network security evaluation. J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 6(2), 41\u201357 (2015)","journal-title":"J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"TCP SYN Flooding and IP Spoofing Attacks. CA-1996\u201321. \n                      http:\/\/www.cert.org\/historical\/advisories\/CA-1996-21.cfm","DOI":"10.1016\/S1353-4858(96)90059-8"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:50:23Z","timestamp":1569383423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}