{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:10:51Z","timestamp":1751688651609,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_5","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T17:45:41Z","timestamp":1526492741000},"page":"44-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["DDoS Reflection Attack Based on IoT: A Case Study"],"prefix":"10.1007","author":[{"given":"Marek","family":"\u0160imon","sequence":"first","affiliation":[]},{"given":"Ladislav","family":"Huraj","sequence":"additional","affiliation":[]},{"given":"Tibor","family":"Hor\u00e1k","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"1","key":"5_CR1","first-page":"5","volume":"6","author":"S Srivastava","year":"2016","unstructured":"Srivastava, S., Pal, N.: Smart cities: the support for Internet of Things (IoT). Int. J. Comput. Appl. Eng. Sci. 6(1), 5\u20137 (2016)","journal-title":"Int. J. Comput. Appl. Eng. Sci."},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"827","DOI":"10.4028\/www.scientific.net\/AMM.513-517.827","volume":"513-517","author":"Miroslav \u00d6lveck\u00fd","year":"2014","unstructured":"\u00d6lveck\u00fd, M., Gabri\u0161ka, D.: Motion capture as an extension of web-based simulation. In: Applied Mechanics and Materials, vol. 513, pp. 827\u2013833 (2014)","journal-title":"Applied Mechanics and Materials"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Horv\u00e1thov\u00e1, D., Sil\u00e1di, V., Lackov\u00e1, E.: Phobia treatment with the help of virtual reality. In: 13th International Scientific Conference on Informatics, pp. 114\u2013119. IEEE (2015)","DOI":"10.1109\/Informatics.2015.7377818"},{"key":"5_CR4","unstructured":"Hos\u0165oveck\u00fd, M., Nov\u00e1k, M., Horv\u00e1thov\u00e1, Z.: Problem-based learning: serious game in science education. In: Proceedings of the 12th International Conference on e-Learning, ICEL 2017, pp. 303\u2013310. ACPI 2017 (2017)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: a review. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"5_CR6","unstructured":"Hesselman, C., et al.: SPIN: a user-centric security extension for in-home networks. SIDN Labs Technical report SIDN-TR-2017-002 (2017)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Lupt\u00e1kov\u00e1, I.D., Posp\u00edchal, J.: Community cut-off attack on malicious networks. In: Conference on Creativity in Intelligent Technologies and Data Science, pp. 697\u2013708. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-65551-2_50"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.25046\/aj0203153","volume":"2","author":"D Pishva","year":"2017","unstructured":"Pishva, D.: IoT: their conveniences, security challenges and possible solutions. Adv. Sci. Technol. Eng. Syst. J. 2(3), 1211\u20131217 (2017)","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"issue":"8","key":"5_CR9","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Ronen, E., et al.: IoT goes nuclear: creating a ZigBee chain reaction. In: IEEE Symposium on Security and Privacy (SP), USA, pp. 195\u2013212 (2017)","DOI":"10.1109\/SP.2017.14"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Halenar, I., Juhasova, B., Juhas, M.: Proposal of communication standardization of industrial networks in Industry 4.0. In: IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES), pp. 119\u2013124 (2016)","DOI":"10.1109\/INES.2016.7555105"},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/JIOT.2017.2704093","volume":"4","author":"J Habibi","year":"2017","unstructured":"Habibi, J., Midi, D., Mudgerikar, A., Bertino, E.: Heimdall: mitigating the Internet of Insecure Things. IEEE Internet Things J. 4(4), 968\u2013978 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5_CR13","first-page":"239","volume":"1","author":"S Singh","year":"2010","unstructured":"Singh, S., Gyanchandani, M.: Analysis of Botnet behavior using Queuing theory. Int. J. Comput. Sci. Commun. 1(2), 239\u2013241 (2010)","journal-title":"Int. J. Comput. Sci. Commun."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Nizami, Y., Garcia-Palacios, E.: Internet of Thing. A proposed secured network topology. ISSC 2014\/CIICT 2014, Limerick, pp. 274\u2013279, June 2014","DOI":"10.1049\/cp.2014.0698"},{"issue":"11","key":"5_CR15","first-page":"58","volume":"10","author":"K Sonar","year":"2014","unstructured":"Sonar, K., Upadhyay, H.: A survey: DDOS attack on Internet of Things. Int. J. Eng. Res. Dev. 10(11), 58\u201363 (2014)","journal-title":"Int. J. Eng. Res. Dev."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Berti-Equille, L., Zhauniarovich, Y.: Profiling DRDoS attacks with data analytics pipeline. In: ACM on Conference on Information and Knowledge Management, 6\u201310 November 2017, Singapore, pp. 1983\u20131986 (2017)","DOI":"10.1145\/3132847.3133155"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1109\/ACCESS.2015.2389854","volume":"2","author":"C Perera","year":"2014","unstructured":"Perera, C., Liu, C.H., Jayawardena, S., Chen, M.: A survey on Internet of Things from industrial market perspective. IEEE Access 2, 1660\u20131679 (2014)","journal-title":"IEEE Access"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Tekeoglu, A., Tosun, A.S.: Investigating security and privacy of a cloud-based wireless IP camera: NetCam. In: IEEE 24th International Conference on Computer Communication and Networks (ICCCN), USA, pp. 1\u20136 (2015)","DOI":"10.1109\/ICCCN.2015.7288421"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: IEEE Conference on Communications and Network Security (CNS), USA, pp. 79\u201384 (2014)","DOI":"10.1109\/CNS.2014.6997469"},{"issue":"2","key":"5_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1515\/jamsi-2015-0010","volume":"11","author":"M \u0160imon","year":"2015","unstructured":"\u0160imon, M., Huraj, L., \u010cer\u0148ansk\u00fd, M.: Performance evaluations of IPTables firewall solutions under DDoS attacks. J. Appl. Math. Stat. Inform. 11(2), 35\u201345 (2015)","journal-title":"J. Appl. Math. Stat. Inform."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"\u0160imon, M., Huraj, L., Hos\u0165oveck\u00fd, M.: IPv6 network DDoS attack with P2P grid. In: Creativity in Intelligent, Technologies and Data Science, pp. 407\u2013415. Springer (2015)","DOI":"10.1007\/978-3-319-23766-4_32"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T15:37:28Z","timestamp":1751643448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}