{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:45:53Z","timestamp":1725511553163},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540714996"},{"type":"electronic","value":"9783540715009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71500-9_13","type":"book-chapter","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T09:36:24Z","timestamp":1182850584000},"page":"169-187","source":"Crossref","is-referenced-by-count":3,"title":["A Detection and Filter System for Use Against Large-Scale DDoS Attacks in the Internet Backbone"],"prefix":"10.1007","author":[{"given":"Lukas","family":"Ruf","sequence":"first","affiliation":[]},{"given":"Arno","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"K\u00e1roly","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Plattner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Alexander, D.S., Arbaugh, W.A., Hicks, M.W., Kakkar, P., Keromytis, A.D., Moore, J.T., Gunter, C.A., Nettles, S.M., Smith, J.M.: The SwitchWare active network architecture. IEEE Network\u00a012(3) (1998)","DOI":"10.1109\/65.690959"},{"key":"13_CR2","volume-title":"Proc. of IFIP\/IEEE Network Operations and Mgmt. Symp. (NOMS) 2002","author":"K.G. Anagnostakis","year":"2002","unstructured":"Anagnostakis, K.G., Ioannidis, S., Miltchev, S., Ioannidis, J., Greenwald, M.B., Smith, J.M.: Efficient packet monitoring for network management. In: Proc. of IFIP\/IEEE Network Operations and Mgmt. Symp (NOMS) 2002, Apr. 2002, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"13_CR3","unstructured":"CAIDA: CAIDA Analysis of Code-Red (2003), http:\/\/www.caida.org\/analysis\/security\/code-red"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Campbell, A.T., Kounavis, M.E., Villela, D.A., Vicente, J., de Meer, H.G., Miki, K., Kalaichelvan, K.S.: NetBind: A Binding Tool for Constructing Data Paths in Network Processor-based Routers. In: Proc. of the 5th Int. Conf. on Open Architectures and Network Programming (OPENARCH), June (2002)","DOI":"10.1109\/OPNARC.2002.1019231"},{"key":"13_CR5","unstructured":"CERT: CERT Advisory CA-2003-04 MS-SQL Server Worm (2003), http:\/\/www.cert.org\/advisories\/CA-2003-04.html"},{"key":"13_CR6","unstructured":"CERT: CERT Advisory CA-2003-20 W32\/Blaster Worm (2003), http:\/\/www.cert.org\/advisories\/CA-2003-20.html"},{"key":"13_CR7","unstructured":"Cisco: White Paper: NetFlow Services and Applications (2002), http:\/\/www.cisco.com"},{"key":"13_CR8","unstructured":"Ferngesteuerte Spam-Armeen. c\u2019t Magazine, Issue 5 (2004)"},{"key":"13_CR9","unstructured":"Danyliw, R., Householder, A.: CERT Advisory CA-2001-19 \u201cCode Red\u201d Worm Exploiting Buffer Overflow in IIS Indexing Service DLL (2001), http:\/\/www.cert.org\/advisories\/CA-2001-19.html"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Decasper, D., Dittia, Z., Parulkar, G., Plattner, B.: Router plugins: A software architecture for next-generation routers. IEEETNWKG: IEEE\/ACM Trans. on Networking. IEEE Comm. Society, IEEE Computer Society and the ACM with its Special Interest Group on Data Comm. (SIGCOMM), ACM Press, 8 (2000)","DOI":"10.1109\/90.836474"},{"key":"13_CR11","volume-title":"13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE 2004); Workshop on Enterprise Security, Modena, Italy","author":"T. D\u00fcbendorfer","year":"2004","unstructured":"D\u00fcbendorfer, T., Wagner, A., Plattner, B.: An Economic Damage Model for Large-Scale Internet Attacks. In: 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE 2004); Workshop on Enterprise Security, Modena, Italy, IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"13_CR12","unstructured":"Gavrilovska, A.: SPLITS Stream Handlers: Deploying Application-level Services to Attached Network Processors. Ph.D. Thesis, Georgia Institute of Technology, Jul (2004)"},{"key":"13_CR13","volume-title":"Proc. of the 8th IEEE Symp. on Computers and Communication (ISCC), Kemer, Antalya, Turkey","author":"A. Hess","year":"2003","unstructured":"Hess, A., Jung, M., Sch\u00e4fer, G.: FIDRAN: A Flexible Intrusion Detection and Repsonse Framework for Actie Networks. In: Proc. of the 8th IEEE Symp. on Computers and Communication (ISCC), Kemer, Antalya, Turkey, Jul. 2003, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"13_CR14","unstructured":"IBM Corp. IBM PowerNP NP4GS3 databook (2002), http:\/\/www.ibm.com"},{"key":"13_CR15","unstructured":"Intel Corp. Intel IXP1200 Network Processor \u2013 Datasheet (2000), http:\/\/www.intel.com"},{"key":"13_CR16","unstructured":"Intel Corp. Intel IXP2800 Network Processor Hardware Reference Manual (Nov. 2002), http:\/\/www.intel.com"},{"key":"13_CR17","unstructured":"Intel Corp. IXP2800 Intel Network Processor IP Forwarding Benchmark Full Disclosure Report for OC192-POS (Oct. 2003), http:\/\/www.intel.com"},{"key":"13_CR18","unstructured":"Karlin, S., Peterson, L.: VERA: An extensible router architecture. In: Proc. of the 4th Int. Conf. on Open Architectures and Network Programming (OPENARCH), Apr. (2001)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36199-5_2","volume-title":"Active Networks","author":"R. Keller","year":"2002","unstructured":"Keller, R., Ruf, L., Guindehi, A., Plattner, B.: PromethOS: A Dynamically Extensible Router Architecture Supporting Explicit Routing. In: Sterbenz, J.P.G., Takada, O., Tschudin, C.F., Plattner, B. (eds.) IWAN 2002. LNCS, vol.\u00a02546, Springer, Heidelberg (2002)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M., Modular, C.: The click modular router. ACM Trans. on Computer Systems\u00a018(3) (2000)","DOI":"10.1145\/354871.354874"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Active Networks","author":"J.W. Lockwood","year":"2004","unstructured":"Lockwood, J.W., Moscola, J., Reddick, D., Kulig, M., Brooks, T.: Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. In: Wakamiya, N., Solarski, M., Sterbenz, J.P.G. (eds.) IWAN 2003. LNCS, vol.\u00a02982, Springer, Heidelberg (2004)"},{"key":"13_CR22","unstructured":"Network Processing Forum (June 2004), http:\/\/www.npforum.org"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission control protocol. RFC 792, ISI (Sept. 1981)","DOI":"10.17487\/rfc0793"},{"key":"13_CR24","volume-title":"Proc. of 2004 ACS\/IEEE Int. Conf. on Perv. Services (ICPS\u20192004)","author":"L. Ruf","year":"2004","unstructured":"Ruf, L., Keller, R., Plattner, B.: A Scalable High-performance Router Platform Supporting Dynamic Service Extensibility On Network and Host Processors. In: Proc. of 2004 ACS\/IEEE Int. Conf. on Perv. Services (ICPS\u20192004), July 2004, IEEE, Los Alamitos (2004)"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","volume-title":"Active Networks","author":"L. Ruf","year":"2004","unstructured":"Ruf, L., Pletka, R., Erni, P., Droz, P., Plattner, B.: Towards High-performance Active Networking. In: Wakamiya, N., Solarski, M., Sterbenz, J.P.G. (eds.) IWAN 2003. LNCS, vol.\u00a02982, Springer, Heidelberg (2004)"},{"key":"13_CR26","volume-title":"ACM Workshop on Rapid Malcode (WORM)","author":"S.E. Schechter","year":"2003","unstructured":"Schechter, S.E., Smith, D.S.: Access For Sale. In: ACM Workshop on Rapid Malcode (WORM), ACM Press, New York (2003)"},{"key":"13_CR27","unstructured":"Silicon Software System. Application Reference Board for the IBM PowerNP NP4GS3 Network Processor User Manual (2002), http:\/\/www.s3group.com"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Sollins, K.: The TFTP Protocol (Revision 2). RFC 1350, MIT (July 1992)","DOI":"10.17487\/rfc1350"},{"key":"13_CR29","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: Proc. of the 11th USENIX Security Symp., Aug. (2002)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Tennenhouse, D., Wetherall, D.: Towards an Active Network Architecture. In: Multimedia Computing and Networking (MMCN 96), San Jose (1996)","DOI":"10.1145\/231699.231701"},{"issue":"8375","key":"13_CR31","first-page":"9","volume":"371","author":"The Economist","year":"2004","unstructured":"The Economist. E-commerce takes off. The Economist 371(8375), 9 (2004)","journal-title":"The Economist"},{"key":"13_CR32","volume-title":"ACM Workshop on Rapid Malcode (WORM)","author":"A. Wagner","year":"2003","unstructured":"Wagner, A., D\u00fcbendorfer, T., Plattner, B., Hiestand, R.: Experiences with Worm Propagation Simulations. In: ACM Workshop on Rapid Malcode (WORM), ACM Press, New York (2003)"},{"key":"13_CR33","volume-title":"ACM SACT Workshop","author":"A. Wagner","year":"2002","unstructured":"Wagner, A., Plattner, B.: Peer-to-peer systems as attack platform for distributed denial-of-service. In: ACM SACT Workshop, Washington, DC, USA, ACM, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Active Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71500-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:22:12Z","timestamp":1605745332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71500-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540714996","9783540715009"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71500-9_13","relation":{},"subject":[]}}