{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:23Z","timestamp":1740096023199,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_3","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"29-40","source":"Crossref","is-referenced-by-count":8,"title":["TCP Ack Storm DoS Attacks"],"prefix":"10.1007","author":[{"given":"Raz","family":"Abramov","sequence":"first","affiliation":[]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Borella, M., Grabelsky, D., Lo, J., Taniguchi, K.: Realm Specific IP: Protocol Specification. RFC 3103 (Experimental) (October 2001), http:\/\/www.ietf.org\/rfc\/rfc3103.txt","DOI":"10.17487\/rfc3103"},{"key":"3_CR2","unstructured":"Chandra, P.: How To Make A WiFi Antenna Out of A Pringles Can. makeuseof.com (August 2009), http:\/\/www.makeuseof.com\/tag\/how-to-make-a-wifi-antenna-out-of-a-pringles-can-nb\/"},{"key":"3_CR3","unstructured":"Herzberg, A., Shulman, H.: Stealth DoS attacks on secure channels. In: NDSS (March 2010)"},{"key":"3_CR4","first-page":"7","volume-title":"Proceedings of the 5th Symposium on UNIX Security","author":"L. Joncheray","year":"1995","unstructured":"Joncheray, L.: A simple active attack against TCP. In: Proceedings of the 5th Symposium on UNIX Security, pp. 7\u201320. USENIX Association, Berkeley (June 1995)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Lam, A., Akritidis, A.: Puppetnets: Misusing web browsers as a distributed attack infrastructure. In: SIGSAC: 13th ACM Conference on Computer and Communications Security. ACM SIGSAC (2006)","DOI":"10.1145\/1180405.1180434"},{"key":"3_CR6","unstructured":"Postel, J.: Transmission Control Protocol. RFC 793 (Standard) (Sep 1981), http:\/\/www.ietf.org\/rfc\/rfc793.txt , updated by RFCs 1122, 3168"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Sherwood, B.: Braud: Misbehaving TCP receivers can cause internet-wide congestion collapse. In: SIGSAC: 12th ACM Conference on Computer and Communications Security. ACM SIGSAC (2005)","DOI":"10.1145\/1102120.1102170"},{"key":"3_CR8","unstructured":"Vaughn, R., Evron, G.: DNS amplification attacks. ISOTF (March 2006), http:\/\/www.isotf.org\/news\/DNS-Amplification-Attacks.pdf"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-1-84628-905-7_15","volume-title":"Communities and Technologies 2007","author":"M. Wong","year":"2007","unstructured":"Wong, M., Clement, A.: Sharing wireless internet in urban neighbourhoods. In: Steinfield, C., Pentland, B.T., Ackerman, M., Contractor, N. (eds.) Communities and Technologies 2007, pp. 275\u2013294. Springer, London (2007), http:\/\/dx.doi.org\/10.1007\/978-1-84628-905-7_15 , doi:10.1007\/978-1-84628-905-7_15"},{"key":"3_CR10","series-title":"Signals and Communication Technology","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-0-387-33112-6_5","volume-title":"Wireless Network Security","author":"B. Wu","year":"2007","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.Z. (eds.) Wireless Network Security. Signals and Communication Technology, pp. 103\u2013135. Springer, US (2007), http:\/\/dx.doi.org\/10.1007\/978-0-387-33112-6_5 , doi:10.1007\/978-0-387-33112-6_5"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:03:35Z","timestamp":1606187015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_3","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}