{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:39:38Z","timestamp":1725867578976},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319475592"},{"type":"electronic","value":"9783319475608"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47560-8_7","type":"book-chapter","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T00:59:42Z","timestamp":1475888382000},"page":"101-116","source":"Crossref","is-referenced-by-count":0,"title":["ML: DDoS Damage Control with MPLS"],"prefix":"10.1007","author":[{"given":"Pierre-Edouard","family":"Fabre","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]},{"given":"Jouni","family":"Viinikka","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Blanc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,9]]},"reference":[{"key":"7_CR1","unstructured":"Cisco Security Intelligence Operations: Cisco 2014 Annual Security Report. Technical report, Cisco (2014)"},{"key":"7_CR2","unstructured":"Prince, M.: Technical details behind a 400gbps NTP amplification DDoS attack"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Rossow, C.: Amplification hell: revisiting network protocols for DDoS abuse. In: NDSS. The Internet Society (2014)","DOI":"10.14722\/ndss.2014.23233"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Casado, M., Cao, P., Akella, A., Provos, N.: Flow-cookies: using bandwidth amplification to defend against DDoS flooding attacks. Quality of Service - IWQoS 2006, pp. 286\u2013287 (2006)","DOI":"10.1109\/IWQOS.2006.250484"},{"key":"7_CR5","unstructured":"Greenhalgh, A., Handley, M., Huici, F.: Using routing and tunneling to combat DoS attacks. In: SRUTI. USENIX Association (2005)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Abujoda, A., Papadimitriou, P.: Midas: middlebox discovery and selection for on-path flow processing. In: COMSNETS, pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/COMSNETS.2015.7098686"},{"key":"7_CR7","unstructured":"Mahimkar, A., Dange, J., Shmatikov, V., Vin, H.M., Zhang, Y.: dFence: transparent network-based Denial of Service mitigation. In: NSDI. USENIX (2007)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Qazi, Z.A., Tu, C.C., Chiang, L., Miao, R., Sekar, V., Yu, M.: SIMPLE-fying middlebox policy enforcement using SDN. In: ACM SIGCOMM 2013 Conference","DOI":"10.1145\/2534169.2486022"},{"issue":"3","key":"7_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V Paxson","year":"2001","unstructured":"Paxson, V.: An analysis of using reflectors for distributed Denial-of-Service attacks. Comput. Commun. Rev. 31(3), 38\u201347 (2001)","journal-title":"Comput. Commun. Rev."},{"key":"7_CR10","unstructured":"Cisco, I.: Unicast reverse path forwarding (1999)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827, May 2000","DOI":"10.17487\/rfc2827"},{"key":"7_CR12","unstructured":"Systems, C.: Remotely triggered black hole filtering - destination based and source based. Technical report, Cisco Systems (2005)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Fung, C.J., McCormick, B.: VGuard: a distributed denial of service attack mitigation method using network function virtualization. In: Network and Service Management (CNSM), pp. 64\u201370, November 2015","DOI":"10.1109\/CNSM.2015.7367340"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Hachem, N., Debar, H., Garc\u00eda-Alfaro, J.: HADEGA: a novel MPLS-based mitigation solution to handle network attacks. In: IPCCC, pp. 171\u2013180. IEEE (2012)","DOI":"10.1109\/PCCC.2012.6407750"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental), March 2007","DOI":"10.17487\/rfc4765"},{"key":"7_CR16","unstructured":"Teague, N.: Open threat signaling using RPC API over HTTPS and IPFIX. Internet-Draft draft-teague-open-threat-signaling-01, IETF Secretariat, July 2015"},{"key":"7_CR17","unstructured":"Cisco, I.: Netflow (2008)"},{"key":"7_CR18","unstructured":"Traffic monitoring using sflow (2003)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sadasivan, G., Brownlee, N., Claise, B., Quittek, J.: Architecture for IP Flow Information Export. RFC 5470, March 2009","DOI":"10.17487\/rfc5470"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Baker, Z.K., Prasanna, V.K.: Time and area efficient pattern matching on FPGAs. In: Tessier, R., Schmit, H. (eds.) FPGA, pp. 223\u2013232. ACM (2004)","DOI":"10.1145\/968280.968312"},{"key":"7_CR21","unstructured":"Roesch, M.: Snort: lightweight intrusion detection for networks. In: Parter, D.W. (ed.) LISA, pp. 229\u2013238. USENIX (1999)"},{"key":"7_CR22","unstructured":"Vordos, I.: Mitigating distributed denial of service attacks with multi-protocol label switching-traffic engineering (MPLS-TE). Ph.D. thesis, Naval Postgraduate School (2009)"},{"key":"7_CR23","unstructured":"Understanding ACL on catalyst 6500 series switches. Technical report, Cisco"},{"issue":"2","key":"7_CR24","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TNET.2006.872576","volume":"14","author":"S Dharmapurikar","year":"2006","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Taylor, D.E.: Longest prefix matching using bloom filters. IEEE\/ACM Trans. Netw. 14(2), 397\u2013409 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Chan, E.Y.K., et al.: IDR: an intrusion detection router for defending against distributed denial-of-service (DDOS) attacks. In: ISPAN, pp. 581\u2013586. IEEE Computer Society (2004)","DOI":"10.1109\/ISPAN.2004.1300541"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Cohen, S., Matias, Y.: Spectral Bloom filters. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003, pp. 241\u2013252. ACM, New York (2003)","DOI":"10.1145\/872757.872787"},{"issue":"9","key":"7_CR27","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TPDS.2003.1233710","volume":"14","author":"H Wang","year":"2003","unstructured":"Wang, H., Shin, K.G.: Transport-aware IP routers: a built-in protection mechanism to counter DDoS attacks. IEEE Trans. Parallel Distrib. Syst. 14(9), 873\u2013884 (2003)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/978-3-540-24693-0_44","volume-title":"Networking 2004","author":"M Menth","year":"2004","unstructured":"Menth, M., Reifert, A., Milbrandt, J.: Self-protecting multipaths \u2014 a simple and resource-efficient protection switching mechanism for MPLS networks. In: Mitrou, N., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 526\u2013537. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24693-0_44"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Kazmi, N.A., Koster, A.M.C.A., Branke, J.: Formulations and algorithms for the multi-path selection problem in network routing. In: ICUMT, pp. 738\u2013744. IEEE (2012)","DOI":"10.1109\/ICUMT.2012.6459762"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Murthy, S., Garcia-Luna-Aceves, J.J.: Congestion-oriented shortest multipath routing. In: Proceedings IEEE INFOCOM 1996, pp. 1028\u20131036. IEEE (1996)","DOI":"10.1109\/INFCOM.1996.493045"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, J., Xi, K., Zhang, L., Chao, H.J.: Optimizing network performance using weighted multipath routing. In: 21st International Conference on Computer Communications and Networks (ICCCN), 2012, pp. 1\u20137, July 2012","DOI":"10.1109\/ICCCN.2012.6289274"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture. RFC 3031, January 2001","DOI":"10.17487\/rfc3031"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Awduche, D., Malcolm, J., Agogbua, J., O\u2019Dell, M., McManus, J.: Requirements for Traffic Engineering Over MPLS. RFC 2702 (Informational), September 1999","DOI":"10.17487\/rfc2702"},{"key":"7_CR34","unstructured":"Faucheur, F.L., et al.: Multi-Protocol Label Switching (MPLS) Support of Differentiated Services. RFC 3270, May 2002"},{"issue":"7","key":"7_CR35","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Fan, L., Cao, P., Almeida, J.M., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. In: SIGCOMM, pp. 254\u2013265 (1998)","DOI":"10.1145\/285237.285287"},{"key":"7_CR37","unstructured":"Cisco: Cisco IOS Quality of Service Solutions Configuration Guide, Release 12.2 - Policing and Shaping Overview"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Fontugne, R., Borgnat, P., Abry, P., Fukuda, K.: MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: CoNEXT, p. 8. ACM (2010)","DOI":"10.1145\/1921168.1921179"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47560-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T11:03:05Z","timestamp":1568458985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47560-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319475592","9783319475608"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47560-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}