{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:02:43Z","timestamp":1743116563291,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_4","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"30-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter"],"prefix":"10.1007","author":[{"given":"Tom\u00e1\u0161","family":"Halagan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tom\u00e1\u0161","family":"Kov\u00e1\u010dik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Tr\u00fachly","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrej","family":"Binder","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"4_CR1","unstructured":"Kotuliak, I., Ryb\u00e1r, P., Tr\u00fachly, P.: Performance comparison of IPsec and TLS based VPN technologies. In: ICETA 2011: 9th IEEE International Conference on Emerging eLearning Technologies and Applications, October 27\u201328, 2011, Star\u00e1 Lesn\u00e1, The High Tatras, Slovakia, pp. 217\u2013221. IEEE, Piscataway (2011). ISBN 978-1-4577-0050-7"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L Fan","year":"2000","unstructured":"Fan, L., et al.: Summary cache: A scalable wide-area web cache sharing protocol. IEEE\/ACM Trans. Netw. 8(3), 281\u2013293 (2000)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Kambhampati, V. et al.: A taxonomy of capabilities based DDoS defense architectures. In: 9th IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 157\u2013164 (2011)","DOI":"10.1109\/AICCSA.2011.6126615"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Rejimol Robinson, R.R, Thomas, C.: Evaluation of mitigation methods for distributed denial of service attacks. In: 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 713\u2013718 (2012)","DOI":"10.1109\/ICIEA.2012.6360818"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Habib, A., Roy, D.: Steps to defend against DoS attacks. In: 12th International Conference on Computers and Information Technology, ICCIT 2009, pp. 614\u2013619 (2009)","DOI":"10.1109\/ICCIT.2009.5407310"},{"key":"4_CR6","unstructured":"Network monitoring tool Katalyzer. \n                      http:\/\/www.katalyzer.sk\/"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, September 1996. \n                      http:\/\/www.cert.org\/advisories\/CA-1996-21.html","DOI":"10.1016\/S1353-4858(96)90059-8"},{"key":"4_CR8","unstructured":"IETF RFC 793.: Transmission control protocol, September 1981. \n                      http:\/\/www.ietf.org\/rfc\/rfc793.txt"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks [CA-96.21] CERT, September 1996. \n                      http:\/\/www.cert.org\/advisories\/CA-1996-21.html","DOI":"10.1016\/S1353-4858(96)90059-8"},{"issue":"7","key":"4_CR10","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"Burton H Bloom","year":"1970","unstructured":"Bloom, Burton H.: Space\/Time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"4_CR11","unstructured":"Tabataba, F.S., Hashemi, M.R.: Improving false positive in Bloom filter. In: 19th Iranian Conference on Electrical Engineering (ICEE), p. 1. IEEE (2011)"},{"key":"4_CR12","unstructured":"Nagy, M., Kotuliak, I.: Enhancing security in mobile data networks through end user and core network cooperation. In: MoMM 2013: The 11th International Conference on Advances in Mobile Computing and Multimedia, Vienna, Austria, pp. 253\u2013259. ACM, New York (2013). ISBN: 978-1-4503-2106-8"},{"issue":"3","key":"4_CR13","first-page":"47","volume":"33","author":"D Yeung","year":"2006","unstructured":"Yeung, D., Chen, W.: Throttling spoofed syn flooding traffic at the source. Telecommunication Systems 33(3), 47\u201365 (2006)","journal-title":"Telecommunication Systems"},{"key":"4_CR14","unstructured":"Cardinal, S.: Use offense to inform defense. Find flaws before the bad guys do. SANS Institute 2000 \u2013 2012, 31 August 2014. \n                      http:\/\/pen-testing.sans.org\/resources\/papers\/gcih\/neptunec-birth-syn-flood-attacks-102303"},{"key":"4_CR15","unstructured":"Hping \u2013 Active Network Security Tool, 31 August 2014. \n                      http:\/\/www.hping.org\/"},{"key":"4_CR16","unstructured":"Acri, E.: Complemento Howto (2011). \n                      http:\/\/complemento.sourceforge.net\/howto\/"},{"key":"4_CR17","unstructured":"Ev1Syn - A SYN Flood with Random Spoofed Source Address. \n                      http:\/\/gopherproxy.meulie.net\/sdf.org\/0\/users\/wisdomc0\/code_c\/ev1syn.c\n                      \n                    . Accessed 31 August 2014"},{"key":"4_CR18","unstructured":"Brouer, J.: Mitigate TCP SYN Flood Attacks with Red Hat Enterprise Linux 7 Beta, 11 April 2014. \n                      http:\/\/rhelblog.redhat.com\/2014\/04\/11\/mitigate-tcp-syn-flood-attacks-with-red-hat-enterprise-linux-7-beta\/"},{"key":"4_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/9781420031454","volume-title":"Securing and Controling CISCO Routers","author":"PT Davis","year":"2002","unstructured":"Davis, P.T.: Securing and Controling CISCO Routers. CRC Press, Boca Raton (2002)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:52:29Z","timestamp":1569383549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}