{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:32:22Z","timestamp":1740547942531,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_76","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"708-716","source":"Crossref","is-referenced-by-count":2,"title":["Effective Packet Marking Approach to Defend against DDoS Attack"],"prefix":"10.1007","author":[{"given":"Heeran","family":"Lim","sequence":"first","affiliation":[]},{"given":"Manpyo","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"76_CR1","unstructured":"Ryan Naraine, M.: DDoS Attack Hit DNS Root Servers, eSecurityPlanet.com (October 2002), http:\/\/www.esecurityplanet.com\/trends\/article.php\/10751_1486981"},{"key":"76_CR2","unstructured":"Inside the Slammer Worm, http:\/\/www.computer.org\/security\/v1n4\/j4wea.htm"},{"key":"76_CR3","unstructured":"Denial of Service Attacks, CERT (1997)"},{"key":"76_CR4","unstructured":"Wang, X., Reiter, M.K.: Defending Against Denial-of-Service Attacks with Puzzle Auctions. In: Proceedings of the 2003 Security and Privacy Symposium (May 2003)"},{"key":"76_CR5","unstructured":"Ioannidis, J., Bellovin, S.M.: Implementing Pushback: Router-based defense against DDoS attacks. In: Proceedings of the Symposium on Network and Distributed Systems Security(NDSS 2002) (February 2002)"},{"key":"76_CR6","doi-asserted-by":"crossref","unstructured":"Sterne, D., Djahandari, K., Balupari, R., La Cholter, W., Babson, B., Wilson, B., Narasimhan, P., Purtell, A., Schnackenberg, D., Linden, S.: Active network based DDoS defense, pp. 193\u2013203","DOI":"10.1109\/DANCE.2002.1003493"},{"key":"76_CR7","unstructured":"Gustavo, L., Arruda, M.: Around Network Intrusion Prevention Systems"},{"key":"76_CR8","doi-asserted-by":"crossref","unstructured":"Park, K., Lee, H.: On the Effectiveness of RouteBased Packet Filtering for Distributed DoS Attack. In: Prevention in PowerLaw Internets SIGCOMM 2001, San Diego, California, USA (2001)","DOI":"10.1145\/383059.383061"},{"key":"76_CR9","doi-asserted-by":"crossref","unstructured":"Kashiwa, D., Chen, E.Y., Fuji, H.: Active shaping: a countermeasure against DDoS attacks. In (ECUMN 2002) 2nd European Conference on, 8-10, April 2002, pp. 171\u2013179 (2002)","DOI":"10.1109\/ECUMN.2002.1002103"},{"key":"76_CR10","unstructured":"Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms"},{"key":"76_CR11","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from Distributed Denial of Service Attack Using History-based IP Filtering"},{"key":"76_CR12","unstructured":"Xu, J., Lee, W.: Sustaining Availability of Web Services under Distributed Denial of Service Attacks"},{"key":"76_CR13","unstructured":"Perrig, A., Song, D., Yaar, A.: Pi: A Path Identification Mechanism to Defend against DDoS Attacks. In: Proceedings of the 2003 Security and Privacy Symposium (May 2003)"},{"key":"76_CR14","unstructured":"Perrig, A., Song, D., Yaar, A.: Pi: A new defense mechanism against IP spoofing and DDoS attacks, Technical Report CMU-CS-02-207, Carnegie Mellon University, School of computer Science (December 2002)"},{"key":"76_CR15","unstructured":"Skitter, C. (2000), http:\/\/www.caida.org\/tools\/measurement\/skitter\/"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_76.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:07:56Z","timestamp":1740506876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_76","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}