{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:38:49Z","timestamp":1760708329370},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642228742"},{"type":"electronic","value":"9783642228759"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22875-9_30","type":"book-chapter","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T03:29:18Z","timestamp":1312428558000},"page":"326-334","source":"Crossref","is-referenced-by-count":10,"title":["Network Attack Detection at Flow Level"],"prefix":"10.1007","author":[{"given":"Aleksey A.","family":"Galtsev","sequence":"first","affiliation":[]},{"given":"Andrei M.","family":"Sukhov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Paulauskas, N., Garsva, E.: Computer System Attack Classification. Electronics and Electrical Engineering\u00a02(66) (2006)"},{"issue":"2","key":"30_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun.\u00a034(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun."},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Hussain, A., Heidemann, J., Paradopoulos, C.: A Framework for Classifying Denial-of-Service Attacks, Karlsruhe, Germany, pp. 99\u2013110 (2003)","DOI":"10.1145\/863955.863968"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C. Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defense Mechanisms: Classification and State-of-the-art. Comp. Networks\u00a044, 643\u2013666 (2004)","journal-title":"Comp. Networks"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. CCR 31(3) (July 2001)","DOI":"10.1145\/505659.505664"},{"issue":"10","key":"30_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"R.K.C. Chang","year":"2002","unstructured":"Chang, R.K.C.: Defending against Flooding-based Distributed Denial of Service Attacks: A tutorial. IEEE Communications Magazine\u00a040(10), 42\u201351 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"30_CR7","unstructured":"Cisco IOS NetFlow site, Cisco Systems, www.cisco.com\/go\/netflow"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Claise, B.: NetFlow Services Export Version 9. RFC 3954 (2004)","DOI":"10.17487\/rfc3954"},{"key":"30_CR9","unstructured":"White Paper: Cisco IOS and NX-OS Software Reference Guide, Cisco Systems, http:\/\/www.cisco.com\/web\/about\/security\/intelligence\/ios-ref.html"},{"issue":"98","key":"30_CR10","first-page":"92","volume":"5","author":"F. Afanasiev","year":"2003","unstructured":"Afanasiev, F., Petrov, A., Grachev, V., Sukhov, A.: A Flow-based analysis of Internet traffic. Russian Edition of Network Computing\u00a05(98), 92\u201395 (2003)","journal-title":"Russian Edition of Network Computing"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"McGlone, J., Marshall, A., Woods, R.: An Attack-Resilient Sampling Mechanism for Integrated IP Flow Monitors. In: 29th IEEE International Conference on Distributed Computing Systems Workshops (2009) ISBN: 978-0-7695-3660-6","DOI":"10.1109\/ICDCSW.2009.28"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Yang, W., Gong, J., Ding, W., Wu, X.: Network Traffic Emulation for IDS Evaluation. In: IFIP International Conference on Network and Parallel Computing, pp. 608\u2013612 (2007) ISBN: 978-0-7695-2943-1","DOI":"10.1109\/NPC.2007.125"},{"key":"30_CR13","unstructured":"Deal, R.A.: Cisco Router Firewall Security: DoS Protection (October 2004), www.informit.com\/articles\/printerfriendly.aspx?p=345618"},{"key":"30_CR14","unstructured":"Fullmer, M., Roming, S.: The OSU Flow-tools Package and Cisco Netflow logs. In: Proceedings of the 2000 USENIX LISA Conference, New Orleans, LA (2000)"},{"key":"30_CR15","unstructured":"Haag, P.: Watch your Flows with NfSen and NfDump. In: 50th RIPE Meeting (2005)"},{"key":"30_CR16","unstructured":"Marmorstein, R., Kearns, P.: A tool for automated iptables firewall analysis. In: 2005 USENIX Annual Technical Conference, FREENIX Track, pp. 71\u201382 (April 2005)"}],"container-title":["Lecture Notes in Computer Science","Smart Spaces and Next Generation Wired\/Wireless Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22875-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T19:17:22Z","timestamp":1560453442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22875-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642228742","9783642228759"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22875-9_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}