{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:00:27Z","timestamp":1725537627296},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044915"},{"type":"electronic","value":"9783642044922"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04492-2_31","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T00:01:51Z","timestamp":1252972911000},"page":"301-310","source":"Crossref","is-referenced-by-count":2,"title":["Memory-Efficient IP Filtering for Countering DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Seung Yeob","family":"Nam","sequence":"first","affiliation":[]},{"given":"Taijin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Dagon, D., Gu, G., Lee, C.P., Lee, W.: A Taxonomy of Botnet Structures. In: Proc. of Annual Computer Security Applications Conference (ACSAC) (December 2007)","DOI":"10.1109\/ACSAC.2007.44"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys\u00a039(1) (April 2007)","DOI":"10.1145\/1216370.1216373"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Estan, C., Varghese, G.: New Directions in Traffic Measurement and Accounting. In: Proc. of ACM SIGCOMM (August 2002)","DOI":"10.1145\/633025.633056"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Kompella, R.R., Singh, S., Varghese, G.: On Scalable Attack Detection in the Network. In: Proc. of ACM Internet Measurement Conference (IMC) (October 2004)","DOI":"10.1145\/1028788.1028812"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash Crowds and Denial of Service Attacks: Characterization and Implication for CDNs and Web Sites. In: Proc. of World Wide Web (WWW) Conference (May 2002)","DOI":"10.1145\/511446.511485"},{"key":"31_CR6","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protecting from Distributed Denial of Service Attack Using History-based IP Filtering. In: Proc. of IEEE ICC, May 2003, pp. 482\u2013486 (2003)"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: Proc. of Networking Conference, May 2004, pp. 771\u2013782 (2004)","DOI":"10.1007\/978-3-540-24693-0_63"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol, Technical Report 1361, Univ. of Wisconsin-Madison (February 1998)","DOI":"10.1145\/285237.285287"},{"issue":"6","key":"31_CR9","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/90.650143","volume":"5","author":"M.E. Crovella","year":"1997","unstructured":"Crovella, M.E., Bestavros, A.: Self-similarity in world wide web traffic: evidence and possible causes. IEEE\/ACM Trans. Networking\u00a05(6), 835\u2013846 (1997)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"5","key":"31_CR10","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1049\/ip-sen:20041087","volume":"151","author":"Z. Sun","year":"2004","unstructured":"Sun, Z., He, D., Liang, L., Cruickshank, H.: Internet QoS and traffic modelling. IEEE Proceedings\u00a0151(5), 248\u2013255 (2004)","journal-title":"IEEE Proceedings"}],"container-title":["Lecture Notes in Computer Science","Management Enabling the Future Internet for Changing Business and New Computing Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04492-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T11:42:48Z","timestamp":1558525368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04492-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044915","9783642044922"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04492-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}