{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:11:14Z","timestamp":1758845474360},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_22","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"176-184","source":"Crossref","is-referenced-by-count":3,"title":["DDoS Attack Detection Using Three-State Partition Based on Flow Interaction"],"prefix":"10.1007","author":[{"given":"Jieren","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Boyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Handley, M.: DoS-resistant Internet subgroup report. Internet Architecture WG (2005)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Kumar, V., Jayalekshmy, P., Patra, G., et al.: On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack. IEEE Communications Letters (2009)","DOI":"10.1109\/LCOMM.2009.081555"},{"key":"22_CR3","unstructured":"Cheng, C., Kung, H., Tan, K.: Use of spectral analysis in defense against DoS attacks. In: Proceedings of IEEE GLOBECOM (2002)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-Wide Traffic Anomalies. In: Proceedings of ACM SIGCOMM, Portland, Oregon, USA (2004)","DOI":"10.1145\/1015467.1015492"},{"key":"22_CR5","unstructured":"Abdelsayed, S., Glimsholt, D., Leckie, C., et al.: An efficient filter for denial-of service bandwidth attacks. In: Proceedings of the 46th IEEE GLOBECOM (2003)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Reiher, P.: D-WARD: A Source-End Defense Against Flooding Denial-of-ServiceAttacks. IEEE Trans. on Dependable and Secure Computing (2005)","DOI":"10.1109\/TDSC.2005.35"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: Proceedings of ACM SIGCOMM, Philadelphia, Pennsylvania, USA (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Kotagiri, R.: Proactively detecting distributed denial of service attacks using source ip address monitoring. In: Proceedings of the Third International IFFP-TC6 Networking Conference (2004)","DOI":"10.1007\/978-3-540-24693-0_63"},{"issue":"1","key":"22_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1162\/evco.1999.7.1.45","volume":"7","author":"S. Forrest","year":"1999","unstructured":"Forrest, S., Hofmeyr, S.: Architecture for an artificial immune system. Evolution. Computat.\u00a07(1), 45\u201368 (1999)","journal-title":"Evolution. Computat."},{"key":"22_CR10","unstructured":"Vitaly, S., Ming, W.: Security against probe-response attacks in collaborative intrusion detection. In: Proceedings of ACM SIGCOMM (2007)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, J., Yin, J., Liu, Y., et al.: Detecting Distributed Denial of Service Attack Based on Address Correlation Value. Journal of Computer Research and Development (2009)","DOI":"10.1007\/978-3-642-10847-1_17"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02161-9","volume-title":"FAW 2009","author":"J. Cheng","year":"2009","unstructured":"Cheng, J., Yin, J., Liu, Y., et al.: DDoS attack detection Algorithm using IP Address Features. In: Deng, X., Hopcroft, J.E., Xue, J. (eds.) FAW 2009. LNCS, vol.\u00a05598. Springer, Heidelberg (2009)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1007\/978-3-642-04070-2_106","volume-title":"ICIC 2009","author":"J. Cheng","year":"2009","unstructured":"Cheng, J., Yin, J., Wu, C., et al.: DDoS Attack Detection Method Based on Linear Prediction Model. In: Huang, D.-S., et al. (eds.) ICIC 2009. LNCS, vol.\u00a05754, pp. 1004\u20131013. Springer, Heidelberg (2009)"},{"key":"22_CR14","unstructured":"http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:37:55Z","timestamp":1558388275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}