{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T16:11:35Z","timestamp":1740240695065,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540241287"},{"type":"electronic","value":"9783540305668"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30566-8_96","type":"book-chapter","created":{"date-parts":[[2010,7,2]],"date-time":"2010-07-02T21:07:43Z","timestamp":1278104863000},"page":"825-834","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Technique for Detecting DDoS Attacks at Its Early Stage"],"prefix":"10.1007","author":[{"given":"Bin","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yanxiang","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"96_CR1","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring internet denial of service activity. In: Proceedings of USENIX Security Symposium (2001)","DOI":"10.21236\/ADA400003"},{"key":"96_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Y.: Study on the prevention of SYN flooding by using traffic policing. In: Network Operations and Management Symposium 2000 IEEE\/IFIP, pp. 593\u2013604 (2000)","DOI":"10.1109\/NOMS.2000.830416"},{"key":"96_CR3","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. In: Proceedings of IEEE INFOCOM, vol.\u00a03, pp. 1530\u20131539 (2002)","DOI":"10.1109\/INFCOM.2002.1019404"},{"key":"96_CR4","doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission control protocol: DARPA internet program protocol specification, RFC 793 (1981)","DOI":"10.17487\/rfc0793"},{"key":"96_CR5","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/948109.948116","volume-title":"Proceedings of the 10th ACM conference on Computer and communication security(CCS)","author":"C. Jin","year":"2003","unstructured":"Jin, C., Wang, H.N., Shin, K.G.: Hop-count filtering: An effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM conference on Computer and communication security(CCS), pp. 30\u201341. ACM Press, New York (2003)"},{"key":"96_CR6","unstructured":"Lemon, J.: Resisting SYN flood DoS attacks with a SYN cache. In: Proceedings of the BSDCon 2002 Conference (2002)"},{"key":"96_CR7","unstructured":"Ferguson, P., Senie, D.: (Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, RFC2827)"},{"key":"96_CR8","unstructured":"Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: INFOCOM 2001, pp. 878\u2013886 (2001)"},{"key":"96_CR9","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TPDS.2003.1233709","volume":"14","author":"M. Sung","year":"2003","unstructured":"Sung, M., Xu, J.: IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks. IEEE Transactions on Parallel and Distributed Systems\u00a014, 861\u2013872 (2003)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"96_CR10","first-page":"3","volume-title":"Proceedings of the ACM SIGCOMM Conference","author":"A.C. Snoeren","year":"2001","unstructured":"Snoeren, A.C.: Hash-based IP traceback. In: Proceedings of the ACM SIGCOMM Conference, pp. 3\u201314. ACM Press, New York (2001)"},{"key":"96_CR11","unstructured":"Bellovin, S.M.: ICMP traceback messages. Technical report (2000)"},{"key":"96_CR12","unstructured":"Ioannidis, J., Bellovin, S.M.: Implementing pushback: Router-based defense against DDoS attacks. In: Proceedings of Network and Distributed System Security Symposium, Catamaran Resort Hotel San Diego, California, The Internet Society (2002)"},{"key":"96_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"R..K. Chang","year":"2002","unstructured":"Chang, R.K.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. Communications Magazine\u00a040, 42\u201351 (2002)","journal-title":"Communications Magazine"},{"key":"96_CR14","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks. In: Proceedings 2004 IEEE Symposium, Security and Privacy, pp. 130\u2013143 (2004)","DOI":"10.1109\/SECPRI.2004.1301320"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30566-8_96.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T15:45:30Z","timestamp":1740239130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30566-8_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540241287","9783540305668"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30566-8_96","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}