{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:44:50Z","timestamp":1748583890716,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_3","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:03:21Z","timestamp":1523340201000},"page":"45-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Very Short Intermittent DDoS Attacks in\u00a0an Unsaturated System"],"prefix":"10.1007","author":[{"given":"Huasong","family":"Shan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5729-2898","authenticated-orcid":false,"given":"Qingyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"3_CR1","unstructured":"Amazon Auto Scaling. https:\/\/aws.amazon.com\/documentation\/autoscaling"},{"key":"3_CR2","unstructured":"Amazon CloudWatch Concepts. http:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/monitoring\/cloudwatch_concepts.html"},{"key":"3_CR3","unstructured":"ASA Threat Detection Functionality and Configuration. http:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security\/asa-5500-x-series-next-generation-firewalls\/113685-asa-threat-detection.html"},{"key":"3_CR4","unstructured":"Kaspersky DDoS Intelligence Report for Q1 2017. https:\/\/usa.kaspersky.com\/about\/press-releases\/2017_kaspersky-lab-report-on-ddos-attacks-in-q1-2017-the-lull-before-the-storm"},{"key":"3_CR5","unstructured":"NSFCloud. https:\/\/www.cloudlab.us"},{"key":"3_CR6","unstructured":"RUBBoS. http:\/\/jmob.ow2.org\/rubbos.html"},{"key":"3_CR7","unstructured":"Snort. https:\/\/www.snort.org\/"},{"key":"3_CR8","unstructured":"Snort: The World\u2019s Most Widely Deployed IPS Technology. http:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/brief_c17-733286.html"},{"key":"3_CR9","unstructured":"Snort.AD. http:\/\/www.anomalydetection.info\/?,32"},{"key":"3_CR10","unstructured":"Application DDoS Mitigation. Palo Alto Networks, Inc. (2014)"},{"key":"3_CR11","unstructured":"Clavister DoS and DDos Protection. Clavister, Inc. (2014)"},{"issue":"2","key":"3_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/2331576.2331586","volume":"46","author":"SA Baset","year":"2012","unstructured":"Baset, S.A.: Cloud SLAs: present and future. ACM SIGOPS Oper. Syst. Rev. 46(2), 57\u201366 (2012)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"3_CR13","unstructured":"Curtis, K., Bod\u00edk, P., Armbrust, M., Fox, A., Franklin, M., Jordan, M., Patterson, D.: Determining SLO violations at compile time (2010)"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2408776.2408794","volume":"56","author":"J Dean","year":"2013","unstructured":"Dean, J., Barroso, L.A.: The tail at scale. Commun. ACM 56(2), 74\u201380 (2013)","journal-title":"Commun. ACM"},{"key":"3_CR15","unstructured":"Fayaz, S.K., Tobioka, Y., Sekar, V., Bailey, M.: Bohatei: flexible and elastic DDoS defense. In: USENIX Security (2015)"},{"key":"3_CR16","unstructured":"Gu, G., Zhang, J., Lee, W.: Botsniffer: detecting botnet command and control channels in network traffic. In: NDSS (2008)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Guirguis, M., Bestavros, A., Matta, I.: Exploiting the transients of adaptation for RoQ attacks on internet resources. In: IEEE ICNP (2004)","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Shulman, H.: Socket overloading for fun and cache-poisoning. In: ACM ACSAC (2013)","DOI":"10.1145\/2523649.2523662"},{"key":"3_CR19","unstructured":"IETF: RFC 6298. https:\/\/tools.ietf.org\/search\/rfc6298\/"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Jeon, M., He, Y., Kim, H., Elnikety, S., Rixner, S., Cox, A.L.: TPC: target-driven parallelism combining prediction and correction to reduce tail latency in interactive services. In: ACM ASPLOS (2016)","DOI":"10.1145\/2872362.2872370"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: WWW (2002)","DOI":"10.1145\/511446.511485"},{"key":"3_CR22","unstructured":"Kang, M.S., Lee, S.B., Gligor, V.D.: The crossfire attack. In: IEEE S&P (2013)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Ke, Y.M., Chen, C.W., Hsiao, H.C., Perrig, A., Sekar, V.: CICADAS: congesting the internet with coordinated and decentralized pulsating attacks. In: AsiaCCS (2016)","DOI":"10.1145\/2897845.2897866"},{"issue":"9","key":"3_CR24","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2007.328","volume":"40","author":"Ron Kohavi","year":"2007","unstructured":"Kohavi, R., Longbotham, R.: Online experiments: lessons learned. Computer 40(9) (2007)","journal-title":"Computer"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: ACM SIGCOMM (2003)","DOI":"10.1145\/863955.863966"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Li, J., Sharma, N.K., Ports, D.R., Gribble, S.D.: Tales of the tail: hardware, OS, and application-level sources of tail latency. In: ACM SoCC (2014)","DOI":"10.1145\/2670979.2670988"},{"key":"3_CR27","unstructured":"Luo, X., Chang, R.K.: On a new class of pulsing denial-of-service attacks and the defense. In: NDSS (2005)"},{"issue":"2\u20134","key":"3_CR28","first-page":"216","volume":"7","author":"G Mantas","year":"2015","unstructured":"Mantas, G., Stakhanova, N., Gonzalez, H., Jazi, H.H., Ghorbani, A.A.: Application-layer denial of service attacks: taxonomy and survey. Int. J. Inf. Comput. Secur. 7(2\u20134), 216\u2013239 (2015)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"3_CR29","unstructured":"Mathew, S.: Caching HTTP POST Requests&Responses. http:\/\/www.ebaytechblog.com\/2012\/08\/20\/caching-http-post-requests-and-responses"},{"issue":"2","key":"3_CR30","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. In: USENIX Security (2001)","DOI":"10.21236\/ADA400003"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Oikonomou, G., Mirkovic, J.: Modeling human behavior for defense against flash-crowd attacks. In: IEEE ICC (2009)","DOI":"10.1109\/ICC.2009.5199191"},{"key":"3_CR33","unstructured":"Ramamurthy, P., Sekar, V., Akella, A., Krishnamurthy, B., Shaikh, A.: Remote profiling of resource constraints of web servers using mini-flash crowds. In: USENIX ATC (2008)"},{"issue":"1","key":"3_CR34","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/TNET.2008.926503","volume":"17","author":"S Ranjan","year":"2009","unstructured":"Ranjan, S., Swaminathan, R., Uysal, M., Nucci, A., Knightly, E.: DDos-shield: DDos-resilient scheduling to counter application layer attacks. IEEE\/ACM Trans. Netw. (TON) 17(1), 26\u201339 (2009)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Wang, Q., Kanemasa, Y., Li, J., Jayasinghe, D., Shimizu, T., Matsubara, M., Kawaba, M., Pu, C.: Detecting transient bottlenecks in n-tier applications through fine-grained analysis. In: ICDCS (2013)","DOI":"10.1109\/ICDCS.2013.17"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Wang, Q., Kanemasa, Y., Li, J., Lai, C., Cho, C., Nomura, Y., Pu, C.: Lightning in the cloud: a study of very short bottlenecks on n-tier web application performance. In: USENIX TRIOS (2014)","DOI":"10.1145\/2524211.2524220"},{"issue":"1","key":"3_CR37","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TNET.2008.925628","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie, Y., Yu, S.Z.: Monitoring the application-layer DDoS attacks for popular websites. IEEE\/ACM Trans. Netw. (TON) 17(1), 15\u201325 (2009)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"issue":"4","key":"3_CR38","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR39","unstructured":"Zhang, Y., Mao, Z.M., Wang, J.: Low-rate TCP-targeted dos attack disrupts internet routing. In: NDSS (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T17:51:59Z","timestamp":1571075519000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}