{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T15:34:03Z","timestamp":1768923243261,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319465852","type":"print"},{"value":"9783319465869","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T00:00:00Z","timestamp":1474675200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-46586-9_7","type":"book-chapter","created":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T11:25:04Z","timestamp":1474629904000},"page":"77-97","source":"Crossref","is-referenced-by-count":6,"title":["Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall"],"prefix":"10.1007","author":[{"given":"Adam","family":"Czubak","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Szymanek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,24]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Miao, R., Yu, M., Jain, N.: NIMBUS: cloud-scale attack detection and mitigation. In: Proceedings of the ACM Conference on SIGCOMM, pp. 121\u2013122 (2014)","DOI":"10.1145\/2740070.2631446"},{"key":"7_CR2","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.procs.2011.07.018","volume":"5","author":"D Stevanovic","year":"2011","unstructured":"Stevanovic, D., Vlajic, N., An, A.: Unsupervised clustering of Web sessions to detect malicious and non-malicious website users. Procedia Comput. Sci. 5, 123\u2013131 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Suchacka, G., Sobk\u00f3w, M.: Detection of internet robots using a Bayesian approach. In: Proceedings of the 2nd IEEE International Conference on Cybernetics, Gdynia, Poland, pp. 365\u2013370 (2015)","DOI":"10.1109\/CYBConf.2015.7175961"},{"issue":"2","key":"7_CR4","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TPDS.2013.146","volume":"25","author":"Z Tan","year":"2014","unstructured":"Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447\u2013456 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Tao, Y., Yu, S.: DDoS attack detection at local area networks using information theoretical metrics. In: Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 233\u2013240 (2013)","DOI":"10.1109\/TrustCom.2013.32"},{"key":"7_CR6","unstructured":"Thomas, H.C., Charles, E.L., Ronald, L.R., Clifford, S.: Introduction to algorithms, 3rd edn. ISBN: 9780262033848"},{"key":"7_CR7","unstructured":"Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: Proceedings of the 12th USENIX Security Symposium, pp. 29\u201344. USENIX Association, Berkeley, CA USA (2003)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Bar-Yosef, N., Wool, A.: Remote algorithmic complexity attacks against randomized hash tables. In: Filipe, J., Obaidat, M.S. (eds.) E-business and telecommunications ICETE 2007. CCIS, vol. 23, pp. 162\u2013174. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-88653-2_12"},{"key":"7_CR9","unstructured":"Klink, A., Walde, J.: Efficient denial of service attacks on web application platforms (2011). https:\/\/events.ccc.de\/congress\/2011\/Fahrplan\/events\/4680.en.html"},{"key":"7_CR10","unstructured":"Quynh, H.: Recommendation for applications using approved hash algorithms. NIST technical report SP 800-107. National Institute of Standards and Technology Gaithersburg, MD, US (2009)"},{"key":"7_CR11","unstructured":"US cybercrime: Rising risks, reduced readiness key findings from the 2014 US State of Cybercrime Survey, PricewaterhouseCoopers LLP (2014). http:\/\/www.pwc.com\/cybersecurity"},{"key":"7_CR12","unstructured":"Sedgewick, R., Wayne, K.: Algorithms, 4th edn. Addison-Wesley Professional, Boston (2011)"},{"key":"7_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-69672-5","volume-title":"Data structures and algorithms 1: sorting and searching","author":"K Mehlhorn","year":"1984","unstructured":"Mehlhorn, K.: Data structures and algorithms 1: sorting and searching, vol. 1. Springer, Heidelberg (1984)"},{"key":"7_CR14","unstructured":"Babka, M.: Properties of universal hashing. Master thesis, Charles University in Prague Faculty of Mathematics and Physics (2010). http:\/\/ktiml.mff.cuni.cz\/~babka\/hashing\/thesis.pdf"},{"key":"7_CR15","unstructured":"Plackett, R.L.: Karl Pearson and the chi-squared test. Int. Stat. Rev. (International Statistical Institute, ISI) 51(1), 59\u201372 (1983)"},{"key":"7_CR16","volume-title":"Computer Networks","author":"AS Tanenbaum","year":"2010","unstructured":"Tanenbaum, A.S., Wetherall, D.J.: Computer Networks, 5th edn. Pearson, Boston (2010)","edition":"5"},{"key":"7_CR17","unstructured":"Cisco IOS Security Configuration Guide: Securing the data plane. Release 12.4, Cisco Systems (2014). http:\/\/www.cisco.com\/c\/en\/us\/td\/docs"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2016 \u2013 Part II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46586-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T23:14:09Z","timestamp":1568416449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46586-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,24]]},"ISBN":["9783319465852","9783319465869"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46586-9_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,24]]}}}