{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:59Z","timestamp":1725518819397},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858843"},{"type":"electronic","value":"9783540858867"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85886-7_9","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T08:45:42Z","timestamp":1221641142000},"page":"131-145","source":"Crossref","is-referenced-by-count":12,"title":["Distinguishing between FE and DDoS Using Randomness Check"],"prefix":"10.1007","author":[{"given":"Hyundo","family":"Park","sequence":"first","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Feldman, A., Gilbert, A.D., Huang, P., Willinger, W.: Dynamics of IP traffic: A study of the role variability and the impact of control. In: ACM SIGCOMM (1999)","DOI":"10.1145\/316188.316235"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, May 2001, vol.\u00a0800(22). NIST Special Publication (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Stavrou, A., Keromytis, A.D.: Countering DoS attacks with stateless multipath overlays. In: ACM Computer and Communication Security (November 2005)","DOI":"10.1145\/1102120.1102153"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wang, J.: On network-aware clustering of web clients. In: ACM SIGCOMM (August 2000)","DOI":"10.1145\/347059.347412"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G.M., Savage, S.: Inferring internet Denial-of-Service activity. In: USENIX Security Symposium (2001)","DOI":"10.21236\/ADA400003"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/0024-3795(85)90192-2","volume":"67","author":"G. Marsaglia","year":"1985","unstructured":"Marsaglia, G., Tsay, L.H.: Matrices and the structure of random number sequences. Linear Algebra Appl. Elsevier Science\u00a067, 147\u2013156 (1985)","journal-title":"Linear Algebra Appl. Elsevier Science"},{"key":"9_CR7","unstructured":"Marsaglia, G.: Diehard: A battery of tests of randomness (1996), http:\/\/stat.fsu.edu\/~geo\/diehard.html"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Kim, H., Bahk, S., Kang, I.: Real-time visualization of network attacks on high-speed links. IEEE Network Magazine\u00a018, 30\u201339","DOI":"10.1109\/MNET.2004.1337733"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1093\/ietcom\/e90-b.4.894","volume":"90","author":"H. Park","year":"2007","unstructured":"Park, H., Lee, H., Kim, H.: Detecting unknown worms using randomness check. IEICE Trans. Communication\u00a0E90-B(4), 894\u2013903 (2007)","journal-title":"IEICE Trans. Communication"},{"key":"9_CR10","first-page":"1530","volume":"3","author":"H. Wang","year":"2002","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. IEEE INFOCOM2002\u00a03, 1530\u20131539 (2002)","journal-title":"IEEE INFOCOM2002"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites. In: World Wide Web (May 2002)","DOI":"10.1145\/511446.511485"},{"key":"9_CR12","unstructured":"Argyraki, K.: Active internet traffic filtering: real-time response to Denial-of-Service attacks. In: USENIX Annual Technical Conference (April 2005)"},{"key":"9_CR13","unstructured":"Adamic, L.A.: Zipf, power-laws, and pareto - a ranking tutorial (1999), http:\/\/www.hpl.hp.com\/research\/idl\/papers\/ranking\/ranking.html"},{"key":"9_CR14","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshn, W., Richardson, R.: CSI\/FBI computer crime and security survey. In: Computer Security Inst. (2004)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: the DARPA Information Survivability Conference and Exposition(DISCEX 2003) (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"9_CR16","unstructured":"Niven, L.: Flash crowd, The Flight of the Horse. Ballantine Books (1971)"},{"key":"9_CR17","unstructured":"Casado, M., Akella, A., Cao, P., Provos, N., Shenker, S.: Cookies Along trust-boundaries(CAT): accurate and deployable flood protection. In: USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet(SRUTI) (July 2006)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Rnmamohanarao, K.: Proactively detecting Distributed Denial of Service attacks using source IP address monitoring. In: Networking 2004, pp. 771\u2013782 (2004)","DOI":"10.1007\/978-3-540-24693-0_63"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/11599463_44","volume-title":"Mobile Ad-hoc and Sensor Networks","author":"Y. He","year":"2005","unstructured":"He, Y., Chen, W., Xiao, B.: Detecting SYN flooding attacks near innocent side. In: Jia, X., Wu, J., He, Y. (eds.) MSN 2005. LNCS, vol.\u00a03794, pp. 443\u2013452. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85886-7_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:36:05Z","timestamp":1606167365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85886-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540858843","9783540858867"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85886-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}