{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:29:40Z","timestamp":1774722580319,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491509","type":"print"},{"value":"9783319491516","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_22","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"315-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network"],"prefix":"10.1007","author":[{"given":"Adel","family":"Rajab","sequence":"first","affiliation":[]},{"given":"Chin-Tser","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Al-Shargabi","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Cobb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/303849.303865","volume":"42","author":"S Chatterjee","year":"1999","unstructured":"Chatterjee, S., Pawlowski, S.: All-optical networks. Commun. ACM 42, 74\u201383 (1999)","journal-title":"Commun. ACM"},{"issue":"8","key":"22_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2008.4597102","volume":"46","author":"Y Chen","year":"2008","unstructured":"Chen, Y., Verma, P.K.: Secure optical burst switching: framework and research directions. IEEE Commun. Mag. 46(8), 40\u201345 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"22_CR3","first-page":"69","volume":"8","author":"C Qiao","year":"1999","unstructured":"Qiao, C., Yoo, M.: Optical burst switching (OBS) - a new paradigm for an optical Internet. J. High Speed Netw. 8(1), 69\u201384 (1999)","journal-title":"J. High Speed Netw."},{"key":"22_CR4","first-page":"3","volume":"8","author":"J Turner","year":"1999","unstructured":"Turner, J.: Terabit burst switching. J. High Speed Netw. 8, 3\u201316 (1999)","journal-title":"J. High Speed Netw."},{"key":"22_CR5","volume-title":"Optical Burst Switched Networks","author":"JP Jue","year":"2006","unstructured":"Jue, J.P., Vokkarane, V.M.: Optical Burst Switched Networks. Springer, Berlin (2006)"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.1109\/5.333744","volume":"82","author":"DJ Blumenthal","year":"1994","unstructured":"Blumenthal, D.J., Prucnal, P.R., Sauer, J.R.: Photonic packet switches: architectures and experimental implementations. Proc. IEEE 82, 1650\u20131667 (1994)","journal-title":"Proc. IEEE"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chang, G.-K., Ellinas, G., Meagher, B., Xin, W., Yoo, S.J., Iqbal, M.Z., Way, W., Young, J., Dai, H., Chen, Y.J., Lee, C.D., Yang, X., Chowdhury, A., Chen, S.: Low latency packet forwarding in IP over WDM networks using optical label switching techniques. In: IEEE LEOS 1999 Annual Meeting, pp. 17\u201318 (1999)","DOI":"10.1109\/LEOS.1999.813454"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Sreenath, N., Muthuraj, K., Kuzhandaivelu, G.V.: Threats and vulnerabilities on TCP\/OBS networks. In: Proceedings of the International Conference on Computer Communication and Informatics (ICCCI 2012), pp. 1\u20135 (2012)","DOI":"10.1109\/ICCCI.2012.6158832"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Sliti, M., Hamdi, M., Boudriga, N.: A novel optical firewall architecture for burst switched networks. In: Proceedings of 12th International Conference on Transparent Optical Networks (ICTON), pp. 1\u20135 (2010)","DOI":"10.1109\/ICTON.2010.5549054"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/s11107-014-0484-9","volume":"29","author":"M Sliti","year":"2015","unstructured":"Sliti, M., Boudriga, N.: BHP flooding vulnerability and countermeasure. Photonic Netw. Commun. 29(2), 198\u2013213 (2015)","journal-title":"Photonic Netw. Commun."},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Eddy W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 (2007)","DOI":"10.17487\/rfc4987"},{"issue":"6","key":"22_CR12","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1002\/sec.98","volume":"2","author":"Y Chen","year":"2009","unstructured":"Chen, Y., Verma, P.K., Kak, S.: Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. Secur. Commun. Netw. 2(6), 546\u2013554 (2009)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"22_CR13","first-page":"2249","volume":"2","author":"SS Chouhan","year":"2012","unstructured":"Chouhan, S.S., Sharma, S.: Identification of current attacks and their counter measures in optical burst switched (OBS) network. Int. J. Adv. Comput. Res. 2(1), 2249\u20137277 (2012)","journal-title":"Int. J. Adv. Comput. Res."},{"key":"22_CR14","volume-title":"Cryptography and Network Security","author":"A Kahate","year":"2008","unstructured":"Kahate, A.: Cryptography and Network Security, 2nd edn. McGraw-Hill, New York (2008)","edition":"2"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Yuan, S., Stewart, D.: Protection of optical networks against inter-channel eavesdropping and jamming attacks. In: Proceedings of International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, pp. 34\u201338 (2014)","DOI":"10.1109\/CSCI.2014.14"},{"key":"22_CR16","volume-title":"Cryptography and Network Security","author":"W Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and Network Security. Prentice Hall, Upper Saddle River (2006)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Fernandez, B.T.F., Sreenath, C.N.: Burstification threat in optical burst switched networks. In: IEEE proceeding of International Conference on Communication and Signal Processing, pp.1666\u20131670 (2014)","DOI":"10.1109\/ICCSP.2014.6949804"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Sreenath, N., Muthuraj, K., Sivasubramanian, P.: Secure optical internet: attack detection and prevention mechanism. In: IEEE, pp. 1009\u20131012 (2012)","DOI":"10.1109\/ICCEET.2012.6203922"},{"issue":"4","key":"22_CR19","first-page":"75","volume":"1","author":"K Muthuraj","year":"2012","unstructured":"Muthuraj, K., Sreenath, N.: Secure optical internet: an attack on OBS node in a TCP over OBS network. Int. J. Emerg. Trends Technol. Comput. Sci. 1(4), 75\u201380 (2012)","journal-title":"Int. J. Emerg. Trends Technol. Comput. Sci."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Devi, B.S.K., Preetha, G., Shalinie, S.M.: DDoS detection using host-network based metrics and mitigation in experimental testbed. In: IEEE International Conference on Recent Trends in Information Technology (ICRTIT), MIT, Anna University, Chennai, pp. 423\u2013427 (2012)","DOI":"10.1109\/ICRTIT.2012.6206744"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Patil, R.Y., Ragha, L.: A rate limiting mechanism for defending against flooding based distributed denial of service attack. In: 2011 World Congress on Information and Communication Technologies (WICT), pp. 182\u2013186. IEEE (2011)","DOI":"10.1049\/cp.2012.2512"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Sharma, R., Kumar, K., Singh, K., Joshi, R.C.: Shared based rate limiting: an ISP level solution to deal DDoS attacks. In: 2006 Annual IEEE India Conference, pp. 1\u20136 (2006)","DOI":"10.1109\/INDCON.2006.302831"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Patil, R.Y., Ragha, L.: A dynamic rate limiting mechanism for flooding based distributed denial of service attack. In: Fourth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2012), pp. 135\u2013138. IET (2012)","DOI":"10.1049\/cp.2012.2512"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Wang, F., Hu, X., Su, J.: Mutual-aid team: protect poor clients in rate-limiting-based DDoS defense. In: IEEE 14th International Conference on Communication Technology (ICCT), pp. 773\u2013778 (2012)","DOI":"10.1109\/ICCT.2012.6511308"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Udhayan, J., Anitha, R.: Demystifying and rate limiting ICMP hosted DoS\/DDoS flooding attacks with attack productivity analysis. In: IEEE International Advance Computing Conference, IACC 2009, pp. 558\u2013564, March 2009","DOI":"10.1109\/IADCC.2009.4809072"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, pp. 295\u2013306, August 2000","DOI":"10.1145\/347057.347560"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., Strayer, W.T.: Hash-based IP traceback. In: Proceedings of ACM SIGCOMM 2001, San Diego, CA, USA, pp. 3\u201314 (2001)","DOI":"10.1145\/964723.383060"},{"key":"22_CR28","unstructured":"Gupta, B.B., Misra, M., Joshi, R.C.: An ISP level solution to combat DDoS attacks using combined statistical based approach. arXiv preprint arXiv:1203.2400 (2012)"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Rajam, V.S., Selvaram, G., Kumar, M.P., Shalinie, S.M.: Autonomous system based traceback mechanism for DDoS attack. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), pp. 164\u2013171 (2013)","DOI":"10.1109\/ICoAC.2013.6921945"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, K., Sangal, A.L., Bhandari, A.: Traceback techniques against DDOS attacks: a comprehensive review. In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT), pp. 491\u2013498 (2011)","DOI":"10.1109\/ICCCT.2011.6075132"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Wei, J., Chen, K., Lian, Y.F., Dai, Y.X.: A novel vector edge sampling scheme for IP traceback against DDoS attacks. In: 2010 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 2829\u20132832 (2010)","DOI":"10.1109\/ICMLC.2010.5580796"},{"key":"22_CR32","unstructured":"http:\/\/nsl.csie.nctu.edu.tw\/nctuns.html"},{"key":"22_CR33","unstructured":"Utilization, HP TopTools for Hubs & Switches, Hewlett-Packard Company (1999). http:\/\/hp.com\/rnd\/device_help\/help\/hpwnd\/webhelp\/HPJ4093A\/utilization.htm"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:53Z","timestamp":1749686453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}