{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:09:46Z","timestamp":1767182986182,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152566"},{"type":"electronic","value":"9783642152573"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15257-3_12","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T15:12:58Z","timestamp":1280934778000},"page":"124-135","source":"Crossref","is-referenced-by-count":14,"title":["Use of IP Addresses for High Rate Flooding Attack Detection"],"prefix":"10.1007","author":[{"given":"Ejaz","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"George","family":"Mohay","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Tickle","sequence":"additional","affiliation":[]},{"given":"Sajal","family":"Bhatia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L. Garber","year":"2000","unstructured":"Garber, L.: Denial-of-Service Attacks Rip the Internet. Computer\u00a033(4), 12\u201317 (2000)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Nazario, J.: Political DDoS: Estonia and Beyond (Invited Talk). In: 17th USENIX Security Symposium, San Jose, CA, USA (2008)","key":"12_CR2","DOI":"10.1016\/S1353-4858(08)70086-2"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1216370.1216373","volume":"39","author":"T. Peng","year":"2007","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv.\u00a039(1), 3 (2007)","journal-title":"ACM Comput. Surv."},{"unstructured":"Miercom, Enterprise Firewall: Lab Test Summary Report (2008)","key":"12_CR4"},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.jnca.2005.07.004","volume":"30","author":"T. Peng","year":"2007","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Information sharing for distributed intrusion detection systems. J. Netw. Comput. Appl.\u00a030(3), 877\u2013899 (2007)","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, pp. 771\u2013782 (2004)","key":"12_CR6","DOI":"10.1007\/978-3-540-24693-0_63"},{"doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. In: Proceeding of the 38th IEEE International Conference on Communications (ICC 2003), Anchorage, Alaska (2003)","key":"12_CR7","DOI":"10.1109\/ICC.2003.1204223"},{"unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: System and Process For Detecting Anomalous Network Traffic, W.I.P. Organisation, Editor (2008)","key":"12_CR8"},{"doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In: Proceeding of 11th World Wide Web Conference, Honolulu, Hawaii, USA (2002)","key":"12_CR9","DOI":"10.1145\/511446.511485"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-02270-8_22","volume-title":"Frontiers in Algorithmics","author":"J. Cheng","year":"2009","unstructured":"Cheng, J., et al.: DDoS Attack Detection Algorithm Using IP Address Features. In: Frontiers in Algorithmics, pp. 207\u2013215. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Barford, P., Plonka, D.: Characteristics of Network Traffic Flow Anomalies. In: Proceedings of ACM SIGCOMM Internet Measurement Workshop (2001)","key":"12_CR11","DOI":"10.1145\/505202.505211"},{"doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletto, M.: MULTOPS: A data-structure for bandwidth attack detection. In: Proceedings of 10th Usenix Security Symposium (2001)","key":"12_CR12","DOI":"10.21236\/ADA401819"},{"doi-asserted-by":"crossref","unstructured":"Takada, H.H., Anzaloni, A.: Protecting servers against DDoS attacks with improved source IP address monitoring scheme. In: 2nd Conference on Next Generation Internet Design and Engineering ( NGI \u201906) (2006)","key":"12_CR13","DOI":"10.1109\/NGI.2006.1678236"},{"doi-asserted-by":"crossref","unstructured":"Le, Q., Zhanikeev, M., Tanaka, Y.: Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks. In: 3rd EuroNGI Conference on Next Generation Internet Networks (2007)","key":"12_CR14","DOI":"10.1109\/NGI.2007.371212"},{"issue":"6","key":"12_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive Intrusion Detection: A Data Mining Approach. Artificial Intelligence Review\u00a014(6), 533\u2013567 (2000)","journal-title":"Artificial Intelligence Review"},{"issue":"4","key":"12_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur.\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"unstructured":"Lee, W., et al.: Real time data mining-based intrusion detection. In: DARPA Information Survivability Conference & Exposition II, DISCEX \u201901, Anaheim, CA, USA (2001)","key":"12_CR17"},{"doi-asserted-by":"crossref","unstructured":"Cannady, J.: Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks. In: Proceedings of The 23rd National Information Systems Security Conference, NISSC 2000 (2000)","key":"12_CR18","DOI":"10.1016\/S1353-4858(00)10012-1"},{"issue":"1-2","key":"12_CR19","first-page":"49","volume":"2","author":"X. Xu","year":"2006","unstructured":"Xu, X.: Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction. International Journal of Web Services Practices\u00a02(1-2), 49\u201358 (2006)","journal-title":"International Journal of Web Services Practices"},{"key":"12_CR20","volume-title":"Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance","author":"A. Moosa","year":"2008","unstructured":"Moosa, A., Alsaffar, E.M.: Proposing a hybrid-intelligent framework to secure e-government web applications. In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance. ACM, Cairo (2008)"},{"unstructured":"OpenBSD. PF: The OpenBSD Packet Filter (2009), http:\/\/www.openbsd.org\/faq\/pf\/ (cited November 11, 2009)","key":"12_CR21"},{"unstructured":"OpenBSD. OpenBSD Programmer\u2019s Manual: ioctl - control device (2009), http:\/\/www.openbsd.org\/cgi-bin\/man.cgi?query=ioctl&sektion=2&arch=&apropos=0&manpath=OpenBSD+4.6","key":"12_CR22"},{"unstructured":"OpenBSD. OpenBSD System Manager\u2019s Manual: pfctl - control the packet filter (PF) device (2009), http:\/\/www.openbsd.org\/cgi-bin\/man.cgi?query=pfctl&sektion=8&arch=&apropos=0&manpath=OpenBSD+4.6. (cited November 11, 2009)","key":"12_CR23"},{"unstructured":"Barnett, R.: ModSecurity Core Rule Set (CRS) v2.0 (2009), http:\/\/www.owasp.org\/index.php\/File:OWASP_ModSecurity_Core_Rule_Set.ppt","key":"12_CR24"},{"unstructured":"ModSecurity. ModSecurity Open Source Web Application Firewall (2009), http:\/\/www.modsecurity.org\/index.html","key":"12_CR25"},{"issue":"2","key":"12_CR26","first-page":"84","volume":"1","author":"P. Kabiri","year":"2005","unstructured":"Kabiri, P., Ghorbani, A.A.: Research on Intrusion Detection and Response: A Survey. International Journal of Network Security\u00a01(2), 84\u2013102 (2005)","journal-title":"International Journal of Network Security"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"3372","DOI":"10.1109\/TSP.2006.879308","volume":"54","author":"A.G. Tartakovsky","year":"2006","unstructured":"Tartakovsky, A.G., et al.: A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Transactions on Signal Processing\u00a054, 3372\u20133382 (2006)","journal-title":"IEEE Transactions on Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Ahmed, E., Clark, A., Mohay, G.: Change Detection in Large Repositories of Unsolicited Traffic. In: Proceedings of The Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009), Venice, Italy (2009)","key":"12_CR28","DOI":"10.1109\/ICIMP.2009.8"},{"doi-asserted-by":"crossref","unstructured":"Ahmed, E., Clark, A., Mohay, G.: A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. In: Proceedings of the IFIP International Conference on Network and Parallel Computing (NPC 2008), pp. 168\u2013175, Shanghai, China (2008)","key":"12_CR29","DOI":"10.1109\/NPC.2008.81"},{"unstructured":"Waikato Applied Network Dynamic Research Group, http:\/\/wand.cs.waikato.ac.nz\/","key":"12_CR30"},{"doi-asserted-by":"crossref","unstructured":"Mirkovic, J., et al.: DDoS Benchmarks and Experimenter\u2019s Workbench for the DETER Testbed. In: 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, TridentCom 2007 (2007)","key":"12_CR31","DOI":"10.1109\/TRIDENTCOM.2007.4444680"}],"container-title":["IFIP Advances in Information and Communication Technology","Security and Privacy \u2013 Silver Linings in the Cloud"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15257-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T04:44:14Z","timestamp":1559364254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15257-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152566","9783642152573"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15257-3_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2010]]}}}