{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:03Z","timestamp":1761611403469,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457185"},{"type":"electronic","value":"9783319457192"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45719-2_14","type":"book-chapter","created":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T22:11:24Z","timestamp":1473113484000},"page":"303-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On the Feasibility of TTL-Based Filtering for DRDoS Mitigation"],"prefix":"10.1007","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[]},{"given":"Teemu","family":"Rytilahti","sequence":"additional","affiliation":[]},{"given":"Milivoj","family":"Simeonovski","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Stock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,7]]},"reference":[{"key":"14_CR1","unstructured":"Default TTL values in TCP\/IP. \n                      http:\/\/www.map.meteoswiss.ch\/map-doc\/ftp-probleme.htm"},{"key":"14_CR2","unstructured":"Functional requirements for broadband residential gateway devices. \n                      https:\/\/www.broadband-forum.org\/technical\/download\/TR-124.pdf"},{"key":"14_CR3","unstructured":"RIPE Atlas: Internet data collection system. \n                      https:\/\/atlas.ripe.net\/"},{"key":"14_CR4","unstructured":"RIPE Atlas: Statistics and network coverage. \n                      https:\/\/atlas.ripe.net\/results\/maps\/network-coverage\/"},{"key":"14_CR5","unstructured":"Technical details behind a 400Gbps NTP amplification DDoS attack. \n                      https:\/\/goo.gl\/j7zWEp"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R.: Avoiding traceroute anomalies with Paris traceroute. In: Internet Measurement Conference (2006)","DOI":"10.1145\/1177080.1177100"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1016\/j.comcom.2012.04.008","volume":"35","author":"H Beitollahi","year":"2012","unstructured":"Beitollahi, H., Deconinck, G.: Analyzing well-known countermeasures against distributed denial of service attacks. Comput. Commun. 35, 1312\u20131332 (2012)","journal-title":"Comput. Commun."},{"key":"14_CR8","unstructured":"Durumeric, Z., Bailey, M., Halderman, J.A.: An internet-wide view of internet-wide scanning. In: USENIX Security Symposium (2014)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Gregori, E., Improta, A., Lenzini, L., Rossi, L., Sani, L.: On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement. In: Internet Measurement Conference (2012)","DOI":"10.1145\/2398776.2398803"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM (2003)","DOI":"10.1145\/948109.948116"},{"key":"14_CR11","unstructured":"Katz-Bassett, E., Madhyastha, H.V., Adhikari, V.K., Scott, C., Sherry, J., van Wesep, P., Anderson, T.E., Krishnamurthy, A.: Reverse traceroute. In: USENIX NSDI (2010)"},{"key":"14_CR12","unstructured":"K\u00fchrer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of amplification DDoS attacks. In: USENIX Security Symposium (2014)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Mao, Z.M., Rexford, J., Wang, J., Katz, R.H.: Towards an accurate AS-level traceroute tool. In: Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (2003)","DOI":"10.1145\/863993.863996"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.L.: A taxonomy of DDoS attack and DDoS defense mechanisms. Comput. Commun. Rev. 34, 39\u201353 (2004)","journal-title":"Comput. Commun. Rev."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Mukaddam, A., Elhajj, I., Kayssi, A.I., Chehab, A.: IP spoofing detection using modified hop count. In: International Conference on Advanced Information Networking and Applications (2014)","DOI":"10.1109\/AINA.2014.62"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TNET.2009.2020798","volume":"18","author":"RV Oliveira","year":"2010","unstructured":"Oliveira, R.V., Pei, D., Willinger, W., Zhang, B., Zhang, L.: The (in)completeness of the observed internet AS-level structure. IEEE\/ACM Trans. Netw. 18(1), 109\u2013122 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V Paxson","year":"2001","unstructured":"Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. Comput. Commun. Rev. 31(3), 38\u201347 (2001)","journal-title":"Comput. Commun. Rev."},{"key":"14_CR18","unstructured":"Pepelnjak, I., Durand, J., Doering, G.: BGP operations and security. RFC 7454, RFC Editor (2015). \n                      https:\/\/tools.ietf.org\/html\/rfc7454"},{"key":"14_CR19","unstructured":"Postel, J.: Internet protocol specification. RFC 791, RFC Editor (1981). \n                      https:\/\/tools.ietf.org\/html\/rfc791"},{"key":"14_CR20","unstructured":"Postel, J.: Character generator protocol. RFC 864, RFC Editor (1983). \n                      https:\/\/tools.ietf.org\/html\/rfc864"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Rosen, E.C., Viswanathan, A., Callon, R.: Multiprotocol label switching architecture. RFC 3031, RFC Editor, January 2001. \n                      http:\/\/tools.ietf.org\/html\/rfc3031","DOI":"10.17487\/rfc3031"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Rossow, C.: Amplification hell: revisiting network protocols for DDoS abuse. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23233"},{"key":"14_CR23","unstructured":"Ryba, F.J., Orlinski, M., W\u00e4hlisch, M., Rossow, C., Schmidt, T.C.: Amplification and DRDoS attack defense-a survey and new perspectives. arXiv preprint \n                      arXiv:1505.07892\n                      \n                     (2015)"},{"key":"14_CR24","unstructured":"Specht, S.M., Lee, R.B.: Distributed denial of service: taxonomies of attacks, tools, and countermeasures. In: International Conference on Parallel and Distributed Computing Systems (2004)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45719-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:00:38Z","timestamp":1558314038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45719-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457185","9783319457192"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45719-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RAID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Research in Attacks, Intrusions, and Defenses","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"raid2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}