{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:47:49Z","timestamp":1743043669601,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341281"},{"type":"electronic","value":"9783642341298"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34129-8_36","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T11:15:22Z","timestamp":1350472522000},"page":"381-391","source":"Crossref","is-referenced-by-count":2,"title":["Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding"],"prefix":"10.1007","author":[{"given":"Daewon","family":"Kim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Byoungkoo","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ikkyun","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeongnyeo","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hyunsook","family":"Cho","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Internet World Stats. Internet Growth Statistics, \n                      \n                        http:\/\/www.internetworldstats.com\/emarketing.html"},{"key":"36_CR2","unstructured":"The Internet Economist. The Internet Economy 25 years After.com, \n                      \n                        http:\/\/www.itif.org\/files\/2010-25-years.pdf"},{"key":"36_CR3","unstructured":"Symantec. Internet Security Threat Report-Volume XV, \n                      \n                        http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf"},{"key":"36_CR4","unstructured":"Cisco. Cisco 2010 Annual Security Report, \n                      \n                        http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/vpndevc\/security_annual_report_2010.pdf"},{"key":"36_CR5","unstructured":"Symantec. Symantec\u2019s monthly state of spam report (October 2008), \n                      \n                        http:\/\/eval.symantec.com\/mktginfo\/enterprise\/other_resources\/b-state_of_spam_report_10-2008.en-us.pdf"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Lee, J.-H., Sohn, S.-G., Chang, B.-H., Chung, T.-M.: PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems. ETRI Journal (2009)","DOI":"10.4218\/etrij.09.0108.0578"},{"key":"36_CR7","unstructured":"Hauri. 7.7 DDos Virus Report, \n                      \n                        http:\/\/www.maxoverpro.org\/77DDoS.pdf"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Liu, X., Yang, X., Xia, Y.: NetFence: Preventing Internet Denial of Service from Inside Out. In: ACM SIGCOMM (2010)","DOI":"10.1145\/1851182.1851214"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Argyraki, K., Cheriton, D.: Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks. ACM\/IEEE ToN\u00a017(4) (2009)","DOI":"10.1109\/TNET.2008.2007431"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G. Carl","year":"2006","unstructured":"Carl, G., Kesidis, G., Brooks, R.: Denial-of-Service Attack-Detection Techniques. IEEE Internet Computing\u00a010, 82\u201389 (2006)","journal-title":"IEEE Internet Computing"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Vijayasarathy, R., Raghavan, S., Ravindran, B.: A system approach to network modelling for DDoS detection using a Naive Bayesian classifier. In: Communication Systems and Networks, COMSNETS (2011)","DOI":"10.1109\/COMSNETS.2011.5716474"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Yu., S., Zhou, W., Dross, R., Jia, W.: Traceback of DDoS Attacks Using Entropy Variations. IEEE Transactions on Parallel and Distributed Systems\u00a022 (2011)","DOI":"10.1109\/TPDS.2010.97"},{"key":"36_CR13","unstructured":"The Open Web Application Security Project. OWASP HTTP Post Tool, \n                      \n                        https:\/\/www.owasp.org\/index.php\/OWASP_HTTP_Post_Tool"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Chang, B.-H., Jeong, C.: An Efficient Network Attack Visualization Using Security Quad and Cube. ETRI Journal (2011)","DOI":"10.4218\/etrij.11.0110.0570"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34129-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:22:54Z","timestamp":1566764574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34129-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341281","9783642341298"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34129-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}