{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:14:37Z","timestamp":1725912877253},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663319"},{"type":"electronic","value":"9783319663326"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_20","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:05Z","timestamp":1507708685000},"page":"450-471","source":"Crossref","is-referenced-by-count":8,"title":["Practical and Accurate Runtime Application Protection Against DoS Attacks"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Elsabagh","sequence":"first","affiliation":[]},{"given":"Dan","family":"Fleck","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kaplan","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Bowen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"unstructured":"myths of ddos attacks. http:\/\/blog.radware.com\/security\/2012\/02\/4-massive-myths-of-ddos\/","key":"20_CR1"},{"unstructured":"The apache http server project. https:\/\/httpd.apache.org\/","key":"20_CR2"},{"unstructured":"Apparmor. http:\/\/wiki.apparmor.net\/index.php\/Main_Page","key":"20_CR3"},{"unstructured":"Application layer DoS attack simulator. http:\/\/github.com\/shekyan\/slowhttptest","key":"20_CR4"},{"unstructured":"Are you ready for slow reading? https:\/\/blog.qualys.com\/securitylabs\/2012\/01\/05\/slow-read","key":"20_CR5"},{"unstructured":"Availability overrides security. http:\/\/hrfuture.net\/performance-and-productivity\/availability-over-rides-cloud-security-concerns.php?Itemid=169","key":"20_CR6"},{"unstructured":"Httperf - http performance measurement tool. http:\/\/linux.die.net\/man\/1\/httperf","key":"20_CR7"},{"unstructured":"Mobile users favor productivity over security. http:\/\/www.infoworld.com\/article\/2686762\/security\/mobile-users-favor-productivity-over-security-as-they-should.html","key":"20_CR8"},{"unstructured":"OpenSIPS: the new breed of communication engine. https:\/\/www.opensips.org\/","key":"20_CR9"},{"unstructured":"Sipp: traffic generator proxy for the sip protocol. http:\/\/sipp.sourceforge.net\/","key":"20_CR10"},{"unstructured":"Slow-Rate Attack. https:\/\/security.radware.com\/ddos-knowledge-center\/ddospedia\/slow-rate-attack\/","key":"20_CR11"},{"unstructured":"Slowloris - apache server vulnerabilities. https:\/\/security.radware.com\/ddos-knowledge-center\/ddospedia\/slowloris\/","key":"20_CR12"},{"unstructured":"When the lights went out: Ukraine cybersecurity threat briefing. https:\/\/www.boozallen.com\/insights\/2016\/09\/ukraine-cybersecurity-threat-briefing\/","key":"20_CR13"},{"unstructured":"Denial of service attacks: A comprehensive guide to trends, techniques, and technologies. ADC Monthly Web Attacks Analysis 12 (2012)","key":"20_CR14"},{"doi-asserted-by":"crossref","unstructured":"Ahrenholz, J.: Comparison of core network emulation platforms. In: Military Communications Conference (2010)","key":"20_CR15","DOI":"10.1109\/MILCOM.2010.5680218"},{"doi-asserted-by":"crossref","unstructured":"Aiello, W., Bellovin, S.M., Blaze, M., Ioannidis, J., Reingold, O., Canetti, R., Keromytis, A.D.: Efficient, DoS-resistant, secure key exchange for internet protocols. In: 9th ACM Conference on Computer and Communications Security (2002)","key":"20_CR16","DOI":"10.1145\/586110.586118"},{"doi-asserted-by":"crossref","unstructured":"Antunes, J., Neves, N.F., Ver\u00edssimo, P.J.: Detection and prediction of resource-exhaustion vulnerabilities. In: International Symposium on Software Reliability Engineering (2008)","key":"20_CR17","DOI":"10.1109\/ISSRE.2008.47"},{"issue":"3\u20134","key":"20_CR18","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1089\/106652700750050844","volume":"7","author":"A Apostolico","year":"2000","unstructured":"Apostolico, A., Bejerano, G.: Optimal amnesic probabilistic automata. J. Comput. Biol. 7(3\u20134), 381\u2013393 (2000)","journal-title":"J. Comput. Biol."},{"doi-asserted-by":"crossref","unstructured":"Burnim, J., Juvekar, S., Sen, K.: Wise: automated test generation for worst-case complexity. In: 31st International Conference on Software Engineering (2009)","key":"20_CR19","DOI":"10.1109\/ICSE.2009.5070545"},{"doi-asserted-by":"crossref","unstructured":"Chang, R.M., et al.: Inputs of coma: static detection of denial-of-service vulnerabilities. In: 22nd Computer Security Foundations Symposium (2009)","key":"20_CR20","DOI":"10.1109\/CSF.2009.13"},{"unstructured":"Chee, W.O., Brennan, T.: Layer-7 ddos. (2010). https:\/\/www.owasp.org\/images\/4\/43\/Layer_7_DDOS.pdf","key":"20_CR21"},{"doi-asserted-by":"crossref","unstructured":"Choi, H.K., Limb, J.O.: A behavioral model of web traffic. In: 7th International Conference on Network Protocols (1999)","key":"20_CR22","DOI":"10.1109\/ICNP.1999.801961"},{"key":"20_CR23","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-1-4419-5906-5_261","volume-title":"Encyclopedia of Cryptography and Security","author":"S Crosby","year":"2011","unstructured":"Crosby, S., Wallach, D.: Algorithmic dos. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 32\u201333. Springer, USA (2011)"},{"unstructured":"Desnoyers, M.: Using the linux kernel tracepoints. https:\/\/www.kernel.org\/doc\/Documentation\/trace\/tracepoints.txt","key":"20_CR24"},{"doi-asserted-by":"crossref","unstructured":"Elsabagh, M., Barbar\u00e1, D., Fleck, D., Stavrou, A.: Radmin: early detection of application-level resource exhaustion and starvation attacks. In: 18th International Conference on Research in Attacks, Intrusions and Defenses (2015)","key":"20_CR25","DOI":"10.1007\/978-3-319-26362-5_24"},{"issue":"6","key":"20_CR26","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1109\/18.720541","volume":"44","author":"RM Gray","year":"1998","unstructured":"Gray, R.M., Neuhoff, D.L.: Quantization. IEEE Trans. Inform. Theory 44(6), 2325\u20132383 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"doi-asserted-by":"crossref","unstructured":"Groza, B., Minea, M.: Formal modelling and automatic detection of resource exhaustion attacks. In: Symposium on Information, Computer and Communications Security (2011)","key":"20_CR27","DOI":"10.1145\/1966913.1966955"},{"doi-asserted-by":"crossref","unstructured":"Gulavani, B.S., Gulwani, S.: A numerical abstract domain based on expression abstraction and max operator with application in timing analysis. In: Computer Aided Verification, pp. 370\u2013384 (2008)","key":"20_CR28","DOI":"10.1007\/978-3-540-70545-1_35"},{"unstructured":"Hilt, V., Eric, N., Charles, S., Ahmed, A.: Design considerations for session initiation protocol (SIP) overload control (2011). https:\/\/tools.ietf.org\/html\/rfc6357","key":"20_CR29"},{"unstructured":"Kostadinov, D.: Layer-7 ddos attacks: detection and mitig. InfoSec Institute (2013)","key":"20_CR30"},{"doi-asserted-by":"crossref","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 190\u2013200. ACM, New York (2005). http:\/\/doi.acm.org\/10.1145\/1065010.1065034","key":"20_CR31","DOI":"10.1145\/1065010.1065034"},{"doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: ACM Sigplan Notices, vol. 42, pp. 89\u2013100. ACM (2007)","key":"20_CR32","DOI":"10.1145\/1250734.1250746"},{"unstructured":"Rosenberg, J., et al.: SIP: Session initiation protocol (2002). https:\/\/www.ietf.org\/rfc\/rfc3261.txt","key":"20_CR33"},{"doi-asserted-by":"crossref","unstructured":"Ruiz-Alvarez, A., Hazelwood, K.: Evaluating the impact of dynamic binary translation systems on hardware cache performance. In: International Symposium on Workload Characterization (2008)","key":"20_CR34","DOI":"10.1109\/IISWC.2008.4636098"},{"unstructured":"Uh, G.R., Cohn, R., Yadavalli, B., Peri, R., Ayyagari, R.: Analyzing dynamic binary instrumentation overhead. In: Workshop on Binary Instrumentation and Application (2007)","key":"20_CR35"},{"issue":"3","key":"20_CR36","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/BF01206331","volume":"14","author":"E Ukkonen","year":"1995","unstructured":"Ukkonen, E.: Online construction of suffix trees. Algorithmica 14(3), 249\u2013260 (1995)","journal-title":"Algorithmica"},{"issue":"4","key":"20_CR37","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"doi-asserted-by":"crossref","unstructured":"Zheng, L., Myers, A.C.: End-to-end availability policies and noninterference. In: 18th IEEE Workshop Computer Security Foundations (2005)","key":"20_CR38","DOI":"10.1109\/CSFW.2005.16"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T10:32:51Z","timestamp":1603103571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}