{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T23:40:09Z","timestamp":1750981209620,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811068973"},{"type":"electronic","value":"9789811068980"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6898-0_8","type":"book-chapter","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T08:35:04Z","timestamp":1510216504000},"page":"95-108","source":"Crossref","is-referenced-by-count":0,"title":["A Ringer-Based Throttling Approach to Mitigate DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Sarvesh V.","family":"Sawant","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Pareek","sequence":"additional","affiliation":[]},{"given":"B. R.","family":"Purushothama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,10]]},"reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/1064340.1064341","volume":"5","author":"M Abadi","year":"2005","unstructured":"Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately hard, memory-bound functions. ACM Trans. Internet Technol. (TOIT) 5(2), 299\u2013327 (2005)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Ali, S.T., Sultana, A., Jangra, A.: Mitigating DDoS attack using random integer factorization. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 699\u2013702, December 2016","DOI":"10.1109\/PDGC.2016.7913212"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170\u2013177. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44810-1_22"},{"key":"8_CR4","unstructured":"Back, A., et al.: Hashcash-a denial of service counter-measure. Technical report (2002)"},{"key":"8_CR5","unstructured":"Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: USENIX Security, vol. 2 (2003)"},{"key":"8_CR6","unstructured":"Darapureddi, A., Mohandas, R., Pais, A.R.: Throttling DDoS attacks using discrete logarithm problem. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u20137. IEEE (2010)"},{"key":"8_CR7","unstructured":"Dean, D., Stubblefield, A.: Using client puzzles to protect TLS. In: USENIX Security Symposium, vol. 42 (2001)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/3-540-45353-9_31","volume-title":"Topics in Cryptology\u2014CT-RSA 2001","author":"P Golle","year":"2001","unstructured":"Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425\u2013440. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45353-9_31"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1002\/9781118256107.ch29","volume-title":"Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications","author":"Q Gu","year":"2007","unstructured":"Gu, Q., Liu, P.: Denial of service attacks. In: Bidgoli, H. (ed.) Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, vol. 3, pp. 454\u2013468. Wiley, Hoboken (2007)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Gujjunoori, S., Syed, T.A., Madhu Babu, J., Darapureddi, A., Mohandas, R., Pais, A.R.: Throttling DDoS attacks. In: Proceedings of the 2009 International Conference on Security and Cryptography (SECRYPT), pp. 121\u2013126. INSTICC Press (2009)","DOI":"10.5220\/0002229001210126"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 30\u201341. ACM (2003)","DOI":"10.1145\/948109.948116"},{"key":"8_CR12","unstructured":"Juels, A., Brainard, J.G.: Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: NDSS 1999, pp. 151\u2013165 (1999)"},{"key":"8_CR13","unstructured":"Li, X., Wang, Y., Zhang, Y.: Session initiation protocol denial of service attack throttling. uS Patent Ap. 13\/944,156, 22 January 2015. https:\/\/www.google.com\/patents\/US20150026793"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Malialis, K., Kudenko, D.: Multiagent router throttling: decentralized coordinated response against DDoS attacks. In: IAAI (2013)","DOI":"10.1609\/aaai.v27i2.19000"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Prier, G., Reiher, P.: Attacking DDoS at the source. In: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 312\u2013321. IEEE (2002)","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"8_CR16","unstructured":"Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st International Conference on Very Large Data Bases, VLDB 2005, pp. 601\u2013612. VLDB Endowment (2005)"},{"key":"8_CR17","unstructured":"Wang, X., Reiter, M.K.: Defending against denial-of-service attacks with puzzle auctions. In: Proceedings of Symposium on Security and Privacy, pp. 78\u201392. IEEE (2003)"},{"issue":"3","key":"8_CR18","first-page":"57","volume":"6","author":"F Wong","year":"2014","unstructured":"Wong, F., Tan, C.X.: A survey of trends in massive DDoS attacks and cloud-based mitigations. Int. J. Netw. Secur. Appl. 6(3), 57 (2014)","journal-title":"Int. J. Netw. Secur. Appl."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6898-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T23:11:53Z","timestamp":1750979513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6898-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811068973","9789811068980"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6898-0_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}