{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T16:10:23Z","timestamp":1725379823667},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1007\/bf03001031","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T08:42:56Z","timestamp":1625647376000},"page":"605-629","source":"Crossref","is-referenced-by-count":0,"title":["A countermeasure againstDDOS attacks using active networks technologies","Protection contre les attaques par saturation r\u00e9parties au moyen de techniques de r\u00e9seaux actifs"],"prefix":"10.1007","volume":"58","author":[{"given":"Dai","family":"Kashiwa","sequence":"first","affiliation":[]},{"given":"Eric Y.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Fuji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03001031_CR1","unstructured":"Hustion (G.), Internet Performance Survival Guide: QoS Strategies for Multiservice Networks,ISBN: 0-471-37808-9, Wiley Computer Publishing, 2000."},{"key":"BF03001031_CR2","doi-asserted-by":"crossref","unstructured":"Moore (D.),Voelker (G.),Savage (S.), Inferring Internet Denial-of-Service Activity,Proceedings of 2001 USENIX Security Symposium, pp. 9\u201322, Aug. 2001.","DOI":"10.21236\/ADA400003"},{"key":"BF03001031_CR3","volume-title":"Hacking Exposed: Network Security Secrets & Solutions","author":"(J.) Scambray","year":"2001","unstructured":"Scambray (J.), Mcclure (S.), Kurts (G.), Hacking Exposed: Network Security Secrets & Solutions, Second Edition, ISBN: 0-07-212748-1,McGraw Hill, U.S.A., 2001.","edition":"Second Edition"},{"key":"BF03001031_CR4","unstructured":"Karnouskos (S.), Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures,Proceedings of the 25th Annual International Computer Software and Applications Conference (COMPSAC\u201901), pp. 445\u2013450, Oct. 2001."},{"key":"BF03001031_CR5","doi-asserted-by":"crossref","unstructured":"Kent (S.)And Atkinson (R.), Security Architecture for the Internet Protocol,RFC2401, Nov. 1998.","DOI":"10.17487\/rfc2401"},{"key":"BF03001031_CR6","doi-asserted-by":"crossref","unstructured":"Dierks (T.),Allen (C.), TheTLS Protocol Version 1.0,RFC2246, Jan. 1999.","DOI":"10.17487\/rfc2246"},{"key":"BF03001031_CR7","doi-asserted-by":"crossref","unstructured":"Ferguson (P.),Senie (D.), Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing,RFC2827, May 2000.","DOI":"10.17487\/rfc2827"},{"key":"BF03001031_CR8","doi-asserted-by":"crossref","unstructured":"Psounis (K.), Active Networks: Applications, Security, Safety, and Architectures,IEEE Communications Surveys, pp. 2\u201316, 1st Quarter 1999.","DOI":"10.1109\/COMST.1999.5340509"},{"key":"BF03001031_CR9","unstructured":"Chen (E.),Fuji (H.), A Security Framework for Agent-Based Active Networks,Proceedings of M2USIC\u20192000, no 4\u20134, Petaling Jaya, Malaysia, Oct. 2000."},{"key":"BF03001031_CR10","doi-asserted-by":"crossref","unstructured":"Schwartz (B.),Jackson (A.),Strayer (T.),Zhou (W.),Patridge (C.),Rockwell (R.), Smart Packets for Active Networks, Proceedings ofIEEE OPENARCH\u201999, pp. 90\u201397, Mar. 1999.","DOI":"10.1109\/OPNARC.1999.758557"},{"key":"BF03001031_CR11","doi-asserted-by":"crossref","unstructured":"Wetherall (D.),Tennenhouse (D.), The ACTIVE_IP Option, 7thACM SIGOPS European Workshop, pp. 33\u201340, Sep. 1996.","DOI":"10.1145\/504450.504457"},{"key":"BF03001031_CR12","unstructured":"Wetherall (D.),Guttag (J.),Tennenhouse (D.),ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols, Proceedings ofIEEE OPENARCH \u201998, pp. 117\u2013129, Apr. 1998."},{"key":"BF03001031_CR13","doi-asserted-by":"crossref","unstructured":"Decasper (D.),Plattner (B.), DAN: Distributed Code Cashing for Active Networks, Proceedings ofIEEE INFOCOM \u201998, pp. 609\u2013616, Apr. 1998.","DOI":"10.1109\/INFCOM.1998.665081"},{"issue":"3","key":"BF03001031_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/65.690959","volume":"12","author":"(C.) Gunter","year":"1998","unstructured":"Gunter (C.), Nettles (S.), Smith (J.), The Switch Ware Active Network Architecture,IEEE Network Magazine,12, no 3., pp. 29\u201336, May\/Jun. 1998.","journal-title":"IEEE Network Magazine"},{"issue":"3","key":"BF03001031_CR15","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/49.917713","volume":"19","author":"(S.) Silva","year":"2001","unstructured":"Silva (S.), Yemini (Y.), Florissi (D.), The NetScript Active Network System,IEEE Journal on Selected Areas in Communications,19, no 3, pp. 538\u2013551, Mar. 2001.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"BF03001031_CR16","unstructured":"Kind (A.), The Role of Network Processors in Active Networks, Proceedings ofANTA 2002, pp. 51\u201356, Mar. 2002."},{"issue":"4","key":"BF03001031_CR17","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/90.413212","volume":"3","author":"(S.) Floyd","year":"1995","unstructured":"Floyd (S.), Jacobson (V.), Link-sharing and Resource Management Models for Packet Networks,IEEE\/ACM Transactions on Networking,3, no 4, pp. 365\u2013386, Aug. 1995.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"BF03001031_CR18","unstructured":"Schnackenberg (D.),Djahandari (K.),Sterne (D.), Infrastructure for intrusion detection and response, Proceedings of theDARPA Information Survivability Conference and Exposition (DISCEX) pp. 1003\u20131011, Jan. 2000."},{"issue":"3","key":"BF03001031_CR19","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/571697.571724","volume":"32","author":"(R.) Mahajan","year":"2002","unstructured":"Mahajan (R.) Bellovin (M. S.), Floyd (S.), Ioannidis (J.), Paxson (V.), Shenker (S.), Controlling High Bandwidth Aggregates in the Network\u201d,SIGCOMM Computer Communication Review,32, no 3, pp. 62\u201373, Jul. 2002.","journal-title":"SIGCOMM Computer Communication Review"},{"key":"BF03001031_CR20","unstructured":"Menage (P.),RACANE: A Resource Controlled Framework for Active Network Services, Proceedings of the First International Working Conference on Active Networks (IWAN \u201999), 1653."}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03001031.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03001031\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03001031.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T15:27:53Z","timestamp":1725377273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03001031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":20,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2003,3]]}},"alternative-id":["BF03001031"],"URL":"https:\/\/doi.org\/10.1007\/bf03001031","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}