{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:57:43Z","timestamp":1760367463910},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698401"},{"type":"electronic","value":"9783540698487"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69848-7_41","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:07:43Z","timestamp":1218542863000},"page":"500-513","source":"Crossref","is-referenced-by-count":6,"title":["Queueing Analysis for Networks Under DoS Attack"],"prefix":"10.1007","author":[{"given":"Amar","family":"Aissani","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","first-page":"9","volume-title":"Proceedings of the 2001 USENIX Security Symposium","author":"D. Moore","year":"2001","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Proceedings of the 2001 USENIX Security Symposium, pp. 9\u201322. IEEE Press, New York (2001)"},{"issue":"2","key":"41_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TII.2005.844422","volume":"1","author":"M. Long","year":"2005","unstructured":"Long, M., Wu, C.-H., Hung, Y.: Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation. IEEE Transactions on Industrial Informatics\u00a01(2), 85\u201396 (2005)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"41_CR3","first-page":"266","volume-title":"Proceedings IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point","author":"S. Khan","year":"2005","unstructured":"Khan, S., Traore, I.: Queue-based Analysis of DoS Attacks. In: Proceedings IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, pp. 266\u2013273. IEEE Press, New York (2005)"},{"key":"41_CR4","doi-asserted-by":"publisher","first-page":"3564","DOI":"10.1016\/j.comnet.2007.02.011","volume":"51","author":"Y. Wang","year":"2007","unstructured":"Wang, Y., Lin, C., Li, Q.-L., Fang, Y.: A Queueing Analysis for the Denial of Service (DoS) Attacks. Computer Networks\u00a051, 3564\u20133573 (2007)","journal-title":"Computer Networks"},{"key":"41_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-75496-1_18","volume-title":"Information Security","author":"D. Boteanu","year":"2007","unstructured":"Boteanu, D., Fernandez, J.M., McHugh, J., Mullins, J.: Queue Management as a DoS counter-measure? In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 263\u2013280. Springer, Heidelberg (2007)"},{"key":"41_CR6","unstructured":"Gnedenko, B.V., Kovalenko, I.N.: Introduction to Queueing Theory, Nauka, Moscow (1967)"},{"issue":"10","key":"41_CR7","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"R.K.C. Chang","year":"2002","unstructured":"Chang, R.K.C.: Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial. IEEE Communications Magazine\u00a040(10), 42\u201351 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"17","key":"41_CR8","doi-asserted-by":"publisher","first-page":"3225","DOI":"10.1016\/j.comnet.2005.12.005","volume":"5","author":"C. Xenakis","year":"2006","unstructured":"Xenakis, C., Laoutaris, N., Merakos, L., Stavrakis, L.: A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms. Computer Networks\u00a05(17), 3225\u20133241 (2006)","journal-title":"Computer Networks"},{"issue":"2","key":"41_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Defence Mechanisms. SIGCOMM Comput. Commun. Rev.\u00a034(2), 39\u201353 (2004)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"41_CR10","first-page":"106","volume":"1","author":"B.A. Sevastianov","year":"1957","unstructured":"Sevastianov, B.A.: An Ergodic Theorem for Markov Processes and its Application to Telephone Systems with Refusals. Theory of Probability and it\u2019s applications, Tom II\u00a01, 106\u2013116 (1957)","journal-title":"Theory of Probability and it\u2019s applications, Tom II"},{"key":"41_CR11","series-title":"Lecture Notes in Computer Science","first-page":"83","volume-title":"Nonlinear estimation and Classification","author":"L. Foster","year":"2003","unstructured":"Foster, L., Cao, J., Cleveland, W., Lin, D., Sun, D.: Internet traffic tends toward Poisson and independent as the load increases. In: Denison, D., Hansen, M., Holmes, C., Mallick, B., Yu, B. (eds.) Nonlinear estimation and Classification. LNCS, vol.\u00a0171, pp. 83\u2013110. Springer, Heidelberg (2003)"},{"key":"41_CR12","series-title":"Wiley Series in Prob. & Stat.","volume-title":"Ergodicity and Stability of Stochastic Processes","author":"A.A. Borovkov","year":"1998","unstructured":"Borovkov, A.A.: Ergodicity and Stability of Stochastic Processes. Wiley Series in Prob. & Stat. J. Wiley & Sons, Chichester (1998)"},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"991","DOI":"10.2307\/3215323","volume":"31","author":"D. Sengupta","year":"1994","unstructured":"Sengupta, D., Deshpande, J.V.: Some Results on the Relative Ageing of Two Life Distributions. J.Appl. Prob.\u00a031, 991\u20131003 (1994)","journal-title":"J.Appl. Prob."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69848-7_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:09:53Z","timestamp":1620000593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69848-7_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540698401","9783540698487"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69848-7_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}