{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:13Z","timestamp":1725574033420},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220541"},{"type":"electronic","value":"9783540247074"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24707-4_79","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T17:05:36Z","timestamp":1294419936000},"page":"673-682","source":"Crossref","is-referenced-by-count":2,"title":["Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents"],"prefix":"10.1007","author":[{"given":"Mihui","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kijoon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. IETF RFC2827 (May 2000)","key":"79_CR1","DOI":"10.17487\/rfc2827"},{"unstructured":"Flanagan, H.L.: Egress filtering \u2013 keeping the Internet safe from your systems, http:\/\/www.giac.org\/practical\/gsec\/Heather_Flanagan_GSEC.pdf","key":"79_CR2"},{"doi-asserted-by":"crossref","unstructured":"Park, K., Lee, H.: On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In: Proc. of ACM SGOMM, pp. 15\u201326 (2001)","key":"79_CR3","DOI":"10.1145\/383059.383061"},{"unstructured":"Li, J., Mirkovic, J., Wang, M., Reiher, P., Zhang, L.: SAVE: Source Address Validity Enforcement Protocol. In: IEEE Infocom (2002)","key":"79_CR4"},{"doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-Count Filtering: An Effective Defense Against Spoofed Traffic. In: Proc. of the 10th ACM Conference on Computer and Communication Security (2003)","key":"79_CR5","DOI":"10.1145\/948109.948116"},{"doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Kotagiri, R.: Protection from Distributed Denial of Service Attacks Using History-based IP Filtering. In: ICC 2003 (2003)","key":"79_CR6","DOI":"10.1007\/3-540-45067-X_19"},{"doi-asserted-by":"crossref","unstructured":"Cabrera, J.B.D., Lewis, L., Qin, X., Lee, W., Prasanth, R.K., Ravichandran, B., Mehra, R.K.: Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables \u2013 A Feasibility Study. In: Proc. of the 7th IEEE\/IFIP International Symposium on Integrated Network Management (May 2001)","key":"79_CR7","DOI":"10.1109\/INM.2001.918069"},{"unstructured":"Lipson, H.F.: Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, SPECIAL REPORT CMU\/SEI-2002-SR-009 (November 2002)","key":"79_CR8"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24707-4_79.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T02:43:25Z","timestamp":1637117005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24707-4_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220541","9783540247074"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24707-4_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}