{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:07:52Z","timestamp":1725491272760},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743767"},{"type":"electronic","value":"9783540743774"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74377-4_92","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T05:38:34Z","timestamp":1189575514000},"page":"878-886","source":"Crossref","is-referenced-by-count":2,"title":["Simulation and Analysis of DDoS in Active Defense Environment"],"prefix":"10.1007","author":[{"given":"Zhongwen","family":"Li","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"92_CR1","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TDSC.2005.35","volume":"2","author":"J. Mirkovic","year":"2005","unstructured":"Mirkovic, J., Reiher, P.: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Transactions on Dependable and Secure Computing\u00a02(3), 216\u2013232 (2005)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"92_CR2","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/JSAC.2003.818807","volume":"22","author":"A.D. Keromytis","year":"2004","unstructured":"Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: An Architecture for Mitigating DDoS Attacks. IEEE Journal on Selected Areas in Communications\u00a022(1), 176\u2013188 (2004)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"92_CR3","unstructured":"Xiang, Y., Zhou, W., Chowdhury, M.: A Survey of Active and Passive Defence Mechanisms against DDoS Attacks, Technical Report, TR C04\/02, School of Information Technology, Deakin University, Australia (2004)"},{"key":"92_CR4","unstructured":"SSFNet, Scalable Simulation Framework (2005), \n                    \n                      http:\/\/www.ssfnet.org"},{"key":"92_CR5","unstructured":"Chen, R.C., Shi, W., Zhou, W.: Simulation of Distributed Denial of ServiceAttacks (Technical Report). In: TR C04\/09, School of Information Technology, Deakin University, Australia (2004)"},{"key":"92_CR6","volume-title":"IEEE Global Telecommunications Conference 2005 (IEEE GLOBECOM 2005)","author":"Y. Xiang","year":"2005","unstructured":"Xiang, Y., Zhou, W.: Mark-Aided Distributed Filtering by Using Neural Network for DDoS Defense. In: IEEE Global Telecommunications Conference 2005 (IEEE GLOBECOM 2005), IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"92_CR7","unstructured":"Dittrich, D.: Distributed Denial of Service (DDoS) Attacks\/tools (2005), \n                    \n                      http:\/\/staff.washington.edu\/dittrich\/misc\/ddos\/"},{"key":"92_CR8","unstructured":"Skitter project, Cooperative Association for Internet Data Analysis (CAIDA), \n                    \n                      http:\/\/www.caida.org\/tools\/measurement\/skitter\/"},{"key":"92_CR9","unstructured":"Xiang, Y., Zhou, W., Rough, J.: Trace IP Packets by Flexible Deterministic Packet Marking (FDPM) In: Proceedings of IEEE International Workshop on IP Operations & Management IPOM, pp. 246\u2013252 (2004)"},{"key":"92_CR10","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: Pi: A Path Identification Mechanism to Defend against DDoS Attacks. In: 2003 IEEE Symposium on Security and Privacy, pp. 93\u2013107 (2003)","DOI":"10.1109\/SECPRI.2003.1199330"},{"issue":"9","key":"92_CR11","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TPDS.2003.1233709","volume":"14","author":"M. Sung","year":"2003","unstructured":"Sung, M., Xu, J.: IP Traceback-based Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems\u00a014(9), 861\u2013872 (2003)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74377-4_92.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:21:55Z","timestamp":1619518915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74377-4_92"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540743767","9783540743774"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74377-4_92","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}