{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T06:10:03Z","timestamp":1739167803975,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_30","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"290-300","source":"Crossref","is-referenced-by-count":7,"title":["Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average"],"prefix":"10.1007","author":[{"given":"Tae Hwan","family":"Kim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sang Min","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jong Sou","family":"Park","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Bezeq, R., Kim, H., Rozovskii, B., Tartakovsky, A.: A Novel Approach to Detection of Denial of-Service Attacks via Adaptive Sequential and Batch equential Change-Point Methods. In: IEEE Systems Man and Cybernetics Information Assurance Workshop, pp. 1\u20137 (2001)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing, RFC 2827 (2000)","DOI":"10.17487\/rfc2827"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Gil, T., Poletto, M.: MULTOPS: A Data Structure for Bandwidth Attack Detection. In: USENIX Security Symposium, Washington D.C (2001)","DOI":"10.21236\/ADA401819"},{"key":"30_CR4","first-page":"1659","volume-title":"Expert Systems with Applications","author":"K. Lee","year":"2008","unstructured":"Lee, K., Kim, J., Kwon, K., Han, Y., Kim, S.: DDoS attack detection method using cluster analysis. In: Expert Systems with Applications, vol.\u00a034, pp. 1659\u20131665. Elsevier, Amsterdam (2008)"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Li, J., Mirkovic, J., Wang, M., Reiher, P., Zhang, L.: SAVE: Source Address Validity Enforcement Protocol. In: INFOCOM 2002, vol.\u00a03, pp. 1557\u20131566 (2002)","DOI":"10.1109\/INFCOM.2002.1019407"},{"key":"30_CR6","first-page":"39","volume-title":"SIGCOMM","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. In: SIGCOMM, vol.\u00a034, pp. 39\u201353. ACM Press, New York (2004)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Prier, G., Reiher, P.: Attacking DDoS at the Source. In: IEEE International Conference on Network Protocols, pp. 312\u2013321 (2002)","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., Govindan, R.: COSSACK: Coordinated Suppression of Simultaneous Attacks. In: DARPA Information Survivability Conference and Exposition Washington DC, vol.\u00a01, pp. 2\u201313 (2003)","DOI":"10.1109\/DISCEX.2003.1194868"},{"issue":"B4","key":"30_CR9","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1093\/ietcom\/e90-b.4.894","volume":"E90","author":"H. Park","year":"2007","unstructured":"Park, H., Lee, H., Kim, H.: Detecting Unknown Worms Using Randomness Check. IEICE Transactions on Communication\u00a0E90(B4), 894\u2013903 (2007)","journal-title":"IEICE Transactions on Communication"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Park, K., Lee, H.: On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In: ACM SIGCOMM (2001)","DOI":"10.1145\/383059.383061"},{"issue":"1","key":"30_CR11","first-page":"69","volume":"38","author":"G. Zhang","year":"2006","unstructured":"Zhang, G., Parashar, M.: Cooperative Defense Against DDoS Attacks. Journal of Research and Practice in Information Technology\u00a038(1), 69\u201384 (2006)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"30_CR12","unstructured":"MIT Lincoln Lab., DARPA intrusion detection scenario specific datasets, http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/2000\/2000_data_index.html (2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T05:39:49Z","timestamp":1739165989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}