{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T09:50:39Z","timestamp":1746525039938,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_20","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"195-204","source":"Crossref","is-referenced-by-count":41,"title":["Taxonomy of Slow DoS Attacks to Web Applications"],"prefix":"10.1007","author":[{"given":"Enrico","family":"Cambiaso","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Papaleo","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Aiello","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"20_CR1","first-page":"1131","volume":"2","author":"S. Kumar","year":"2011","unstructured":"Kumar, S., Singh, M., Sachdeva, M., Kumar, K.: Flooding Based DDoS Attacks and Their Influence on Web Services. (IJCSIT) International Journal of Computer Science and Information Technologies\u00a02(3), 1131\u20131136 (2011)","journal-title":"(IJCSIT) International Journal of Computer Science and Information Technologies"},{"issue":"1","key":"20_CR2","first-page":"14","volume":"7","author":"M. Sachdeva","year":"2010","unstructured":"Sachdeva, M., Singh, G., Kumar, K., Singh, K.: DDoS Incidents and their Impact: A Review. International Arab Journal of Information Technology\u00a07(1), 14\u201320 (2010)","journal-title":"International Arab Journal of Information Technology"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V. Paxson","year":"2001","unstructured":"Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review\u00a031(3), 38\u201347 (2001)","journal-title":"Computer Communication Review"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/JSAC.2003.818807","volume":"22","author":"A.D. Keromytis","year":"2004","unstructured":"Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: An architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications\u00a022(1), 176\u2013188 (2004)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR5","volume-title":"Network intrusion detection","author":"S. Northcutt","year":"2002","unstructured":"Northcutt, S., Novak, J.: Network intrusion detection, 3rd edn. New Riders, Indianapolis (2002)","edition":"3"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: 1997 IEEE Symposium on Security and Privacy - Proceedings, pp. 208\u2013223 (1997)","DOI":"10.1109\/SECPRI.1997.601338"},{"issue":"5","key":"20_CR7","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C. Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks\u00a044(5), 643\u2013666 (2004)","journal-title":"Computer Networks"},{"issue":"15","key":"20_CR8","doi-asserted-by":"publisher","first-page":"2711","DOI":"10.1016\/j.comnet.2010.05.002","volume":"54","author":"G. Macia-Fernandez","year":"2010","unstructured":"Macia-Fernandez, G., Rodriguez-Gomez, R.A., Diaz-Verdejo, J.E.: Defense techniques for low-rate DoS attacks against application servers. Computer Networks\u00a054(15), 2711\u20132727 (2010)","journal-title":"Computer Networks"},{"issue":"4","key":"20_CR9","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.comnet.2006.07.002","volume":"51","author":"G. Macia-Fernandez","year":"2007","unstructured":"Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against iterative servers. Computer Networks\u00a051(4), 1013\u20131030 (2007)","journal-title":"Computer Networks"},{"issue":"7-8","key":"20_CR10","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.cose.2008.07.004","volume":"27","author":"G. Macia-Fernandez","year":"2008","unstructured":"Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against application servers. Computers & Security\u00a027(7-8), 335\u2013354 (2008)","journal-title":"Computers & Security"},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TNET.2006.880180","volume":"14","author":"A. Kuzmanovic","year":"2006","unstructured":"Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE-ACM Transactions on Networking\u00a014(4), 683\u2013696 (2006)","journal-title":"IEEE-ACM Transactions on Networking"},{"issue":"4","key":"20_CR12","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.jnca.2007.12.004","volume":"31","author":"H. Safa","year":"2008","unstructured":"Safa, H., Chouman, M., Artail, H., Karam, M.: A collaborative defense mechanism against SYN flooding attacks in IP networks. Journal of Network and Computer Applications\u00a031(4), 509\u2013534 (2008)","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"20_CR13","first-page":"99","volume":"33","author":"A. Hussain","year":"2003","unstructured":"Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks. Computer Communication Review\u00a033(4), 99\u2013110 (2003)","journal-title":"Computer Communication Review"},{"issue":"8","key":"20_CR14","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/j.cose.2004.06.008","volume":"23","author":"L.C. Chen","year":"2004","unstructured":"Chen, L.C., Longstaff, T.A., Carley, K.M.: Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security\u00a023(8), 665\u2013678 (2004)","journal-title":"Computers & Security"},{"issue":"2","key":"20_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS Defense mechanisms. Computer Communication Review\u00a034(2), 39\u201353 (2004)","journal-title":"Computer Communication Review"},{"key":"20_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/11811305_112","volume-title":"Advanced Data Mining and Applications","author":"U. Tariq","year":"2006","unstructured":"Tariq, U., Hong, M.-P., Lhee, K.-S.: A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. In: Li, X., Za\u00efane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol.\u00a04093, pp. 1025\u20131036. Springer, Heidelberg (2006)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Guirguis, M., Bestavros, A., Matta, I.: Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: 12th IEEE International Conference on Network Protocols - Proceedings, pp. 184\u2013195 (2004)","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of Quality (RoQ) attacks on Internet end-systems. In: Proceedings of the IEEE Infocom 2005: The Conference on Computer Communications, vol.\u00a01-4, pp. 1362\u20131372 (2005)","DOI":"10.1109\/INFCOM.2005.1498361"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs. In: Infocom 2007, vol.\u00a01-5, pp. 857\u2013865 (2007)","DOI":"10.1109\/INFCOM.2007.105"},{"issue":"3","key":"20_CR20","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.jpdc.2006.10.005","volume":"67","author":"M. Guirguis","year":"2007","unstructured":"Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Adversarial exploits of end-systems adaptation dynamics. Journal of Parallel and Distributed Computing\u00a067(3), 318\u2013335 (2007)","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"9","key":"20_CR21","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1016\/j.comcom.2005.09.008","volume":"29","author":"V.A. Siris","year":"2006","unstructured":"Siris, V.A., Papagalou, F.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications\u00a029(9), 1433\u20131442 (2006)","journal-title":"Computer Communications"},{"key":"20_CR22","unstructured":"Huang, Y., Pullen, J.M.: Countering denial-of-service attacks using congestion triggered packet sampling and filtering. In: Proceedings of the Tenth International Conference on Computer Communications and Networks, pp. 490\u2013494 (2001)"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletto, M.: MULTOPS: A data-structure for bandwidth attack detection. In: Usenix Association Proceedings of the 10th Usenix Security Symposium, pp. 23\u201334 (2001)","DOI":"10.21236\/ADA401819"},{"issue":"7","key":"20_CR24","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/35.526895","volume":"34","author":"W. Stallings","year":"1996","unstructured":"Stallings, W.: IPv6: The new Internet protocol. IEEE Communications Magazine\u00a034(7), 96\u2013108 (1996)","journal-title":"IEEE Communications Magazine"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-89173-4_17","volume-title":"Critical Information Infrastructures Security","author":"G. Maci\u00e1-Fern\u00e1ndez","year":"2008","unstructured":"Maci\u00e1-Fern\u00e1ndez, G., D\u00edaz-Verdejo, J.E., Garc\u00eda-Teodoro, P., de Toro-Negro, F.: LoRDAS: A Low-Rate DoS Attack against Application Servers. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol.\u00a05141, pp. 197\u2013209. Springer, Heidelberg (2008)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:28:59Z","timestamp":1744079339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}