{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:02:55Z","timestamp":1775545375615,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T00:00:00Z","timestamp":1484784000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10586-017-0730-x","type":"journal-article","created":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T18:54:45Z","timestamp":1484852085000},"page":"661-671","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Denial of service attacks, defences and research challenges"],"prefix":"10.1007","volume":"20","author":[{"given":"Vinko","family":"Zlomisli\u0107","sequence":"first","affiliation":[]},{"given":"Kre\u0161imir","family":"Fertalj","sequence":"additional","affiliation":[]},{"given":"Vlado","family":"Sruk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"730_CR1","unstructured":"Abliz, M.: Internet Denial of Service Attacks and Defense Mechanisms. University of Pittsburgh Technical Report, No. TR-11-178, March 2011"},{"key":"730_CR2","unstructured":"Abliz, M, Znati, T.: Defeating DDoS using Productive Puzzles. In: Proccedings of International Conference on Information Systems Security and Privacy (ICISSP). Angers, France, pp. 114\u2013123, Feb 9-11 2015"},{"key":"730_CR3","unstructured":"Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From throw-away traffic to bots: detecting the rise of DGA-based Malware. In: Security \u201912 Proceedings of The 21st USENIX Conference on Security Symposium. Bellevue, WA, USA, pp. 24\u201339 Aug 8\u201310 2012"},{"key":"730_CR4","unstructured":"Auriemma, L.: Microsoft Remote Desktop Protocol CVE-2012-0002 Remote Code Execution Vulnerability. SecurityFocus. http:\/\/www.securityfocus.com\/bid\/52353 (2012). Accessed 15 Oct 2013"},{"issue":"1","key":"730_CR5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"730_CR6","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P.: Mitigating DNS DoS attacks. In: CCS \u201908 Proceedings of the 15th ACM Conference on Computer and Communications Security. Alexandria, VA, USA, pp. 189\u2013198 Oct 27\u201331 2008","DOI":"10.1145\/1455770.1455796"},{"key":"730_CR7","unstructured":"Batishchev, A.: Low Orbit Ion Cannon (LOIC). SourceForge. http:\/\/sourceforge.net\/projects\/loic (2012). Accessed 15 Oct 2013"},{"key":"730_CR8","unstructured":"Bhandari, A., Sangal, A. Kumar, K.: Performance Metrics for Defence Framework against Distributed Denial of Service Attacks. ACEEE Int. J. Netw. Secur. 6. April 2014. http:\/\/searchdl.org\/public\/journals\/2014\/IJNS\/5\/2\/39.pdf (2014). Accessed 01 Nov 2014"},{"key":"730_CR9","doi-asserted-by":"publisher","unstructured":"Bhuyan, M., Kashyap, H., Bhattacharyya, D., Kalita, J.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. doi: 10.1093\/comjnl\/bxt031 (2013) UK [SCI, IF: 0.79]","DOI":"10.1093\/comjnl\/bxt031"},{"key":"730_CR10","unstructured":"Bicakci, K., Crispo, B., Tanenbaum, A.: Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. Cryptology ePrint Archive: Report 2006\/212; International Association for Cryptologic Research (2006)"},{"key":"730_CR11","unstructured":"BITAG. SNMP Reflected Amplification DDoS Attack Mitigation. Technical Report 2012-08. Denver, CO: Broadband Internet Technical Advisory Group, Inc. (2012)"},{"issue":"8","key":"730_CR12","first-page":"1","volume":"5","author":"M Bogdanoski","year":"2013","unstructured":"Bogdanoski, M., Shuminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 5(8), 1\u201311 (2013)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"730_CR13","unstructured":"Brennan, T.: OWASP HTTP Post Tool. OWASP. https:\/\/www.owasp.org\/index.php\/OWASP_HTTP_Post_Tool (2010). Accessed 15 Oct 2013"},{"key":"730_CR14","unstructured":"Cavallaro, L., Kruegel, C., Vigna, G.: Mining the Network Behavior of Bots. Technical Report 2009-12. Santa Barbara: Department of Computer Science, University of California (2009)"},{"key":"730_CR15","unstructured":"Chee, O., Brennan, T.: HTTP Post. In: OWASP AppSec. Washington, DC, Nov 8\u201311 2010"},{"issue":"2","key":"730_CR16","first-page":"488","volume":"15","author":"C Chen","year":"2009","unstructured":"Chen, C.: A new detection method for distributed denial-of-service attack traffic based on statistical test. J. Univers. Comput. Sci. 15(2), 488\u2013504 (2009)","journal-title":"J. Univers. Comput. Sci."},{"key":"730_CR17","unstructured":"Cichonski, P., Millar, T., Grance, T., Scarfone, K.: SP 800-61: Computer Security Incident Handling Guide. NIST. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-61rev2\/SP800-61rev2.pdf (2012). Accessed 01 Nov 2014"},{"key":"730_CR18","unstructured":"Cisco Systems Inc. Defeating DDoS Attacks. Cisco Systems Inc. http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/vpndevc\/ps5879\/ps6264\/ps5888\/prod_white_paper0900aecd8011e927.pdf (2004). Accessed 15 Oct 2013"},{"key":"730_CR19","doi-asserted-by":"crossref","unstructured":"Clark, D., Landau, S.: The Problem isn\u2019t Attribution; It\u2019s Multi-Stage Attacks. MIT. http:\/\/groups.csail.mit.edu\/ana\/ANA%20PUBLICATIONS\/The_Problem_isnt_Attribution.pdf (2010). Accessed 12 Nov 2016","DOI":"10.1145\/1921233.1921247"},{"key":"730_CR20","doi-asserted-by":"crossref","unstructured":"Colbaugh, R., Glass, K.: Proactive Defence for Evolving Cyber Threats. Technical Report 2012-11. Alburquerque: Sandia National Laboratories (2012)","DOI":"10.2172\/1059470"},{"key":"730_CR21","unstructured":"Deloitte. Offensive Defence\u2014DDoS Disruption. Delloite. http:\/\/www.deloitte.com\/assets\/Dcom-UnitedStates\/Local%20Assets\/Documents\/AERS\/us_aers_Offensive_Defense%E2%80%93DDoS_Disruption_071814.pdf (2014). Accessed 01 Nov 2014"},{"key":"730_CR22","unstructured":"Department of the Air Force. Capabilities for Cyber Resiliency. Department of the Air Force. https:\/\/www.fbo.gov\/index?s=opportunity&mode=form&id=8482f8ddcbc8471d1ff609574b2d68e8&tab=core&_cview=1 (2014). Accessed 01 Nov 2014"},{"key":"730_CR23","unstructured":"DoD. Department of Defence Strategy for Operating in Cyberspace. DoD. http:\/\/www.defence.gov\/news\/d20110714cyber.pdf (2011). Accessed 15 Nov 2013"},{"issue":"5","key":"730_CR24","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defence mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643\u2013666 (2004)","journal-title":"Comput. Netw."},{"key":"730_CR25","doi-asserted-by":"crossref","unstructured":"Endicott-Popovsky, B, Frincke, D.: Adding the fourth \u2019R\u2019: a systems approach to solving the Hacker\u2019s arms race. In: Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symposium, Kauai, HI, Jan 4\u20137 2006","DOI":"10.1109\/IAW.2004.1437854"},{"key":"730_CR26","unstructured":"F5 Networks, Inc. Application Security Manager. F5 Networks, Inc. https:\/\/f5.com\/products\/modules\/application-security-manager (2014). Accessed 01 Nov 2014"},{"key":"730_CR27","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Johnson, A., Syverson, P.: A model of onion routing with provable anonymity. In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, LNCS forthcoming. Scarborough, Trinidad and Tobago, pp. 55\u201371, Feb 12\u201316 2007","DOI":"10.1007\/978-3-540-77366-5_9"},{"key":"730_CR28","doi-asserted-by":"publisher","unstructured":"Ficco, M, Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. (2014) PP 99. doi: 10.1109\/TCC.2014.2325045","DOI":"10.1109\/TCC.2014.2325045"},{"issue":"1\u20132","key":"730_CR29","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"issue":"8","key":"730_CR30","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.3844\/jcssp.2011.1218.1223","volume":"7","author":"K Ghazali","year":"2011","unstructured":"Ghazali, K., Hassan, R.: Flooding distributed denial of service attacks-a review. J. Comput. Sci. 7(8), 1218\u20131223 (2011). doi: 10.3844\/jcssp.2011.1218.1223","journal-title":"J. Comput. Sci."},{"key":"730_CR31","doi-asserted-by":"crossref","unstructured":"Goel, R., Garuba, M., Girma, A.: Cloud computing vulnerability: DDoS as its main security threat, and analysis of IDS as a solution model. In: 11th International Conference on Information Technology: New Generations (ITNG). Las Vegas, NV, pp. 307\u2013312, Apr 7\u20139 2014","DOI":"10.1109\/ITNG.2014.77"},{"key":"730_CR32","unstructured":"Graham-Cumming, J.: Understanding and mitigating NTP-based DDoS attacks. CloudFlare. http:\/\/blog.cloudflare.com\/understanding-and-mitigating-ntp-based-ddos-attacks (2014). Accessed 02 Apr 2014"},{"issue":"2","key":"730_CR33","doi-asserted-by":"crossref","first-page":"268","DOI":"10.7763\/IJCEE.2010.V2.148","volume":"2","author":"B Gupta","year":"2010","unstructured":"Gupta, B., Joshi, R., Misra, M.: Distributed denial of service prevention techniques. Int. J. Comput. Electr. Eng. 2(2), 268\u2013276 (2010)","journal-title":"Int. J. Comput. Electr. Eng."},{"key":"730_CR34","unstructured":"Gushin, Y., Behar, A.: Roboo. ECL Labs. http:\/\/www.ecl-labs.org\/2011\/03\/17\/roboo-http-mitigator.html (2011). Accessed 15 Oct 2013"},{"key":"730_CR35","doi-asserted-by":"crossref","unstructured":"Handley, M., Rescorla, E.: Internet Denial-of-Service Considerations. Internet Engineering Task Force. http:\/\/tools.ietf.org\/pdf\/rfc4732.pdf (2006). Accessed 15 Oct 2013","DOI":"10.17487\/rfc4732"},{"key":"730_CR36","unstructured":"Hansen, R.: Slowloris. Ha.ckers. http:\/\/ckers.org\/slowloris\/ (2009). Accessed 15 Oct 2013"},{"key":"730_CR37","doi-asserted-by":"crossref","unstructured":"Hari, K., Dohi, T.: Dependability modeling and analysis of random port hopping. In: 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing. Fukuoka, Japan, pp. 586\u2013593, Sept 4\u20137 2012","DOI":"10.1109\/UIC-ATC.2012.113"},{"key":"730_CR38","unstructured":"Holdaway, E.: Active Computer Network Defence: An Assessment. AU\/ACSC\/055\/2001-04. Montgomery, AL: Maxwell AFB (2001)"},{"key":"730_CR39","unstructured":"Johnson, J.: Implementing Active Defence Systems on Private Networks. SANS Institute. https:\/\/www.sans.org\/reading-room\/whitepapers\/attacking\/implementing-active-defence-systems-private-networks-34312 (2013). Accessed 15 Oct 2013"},{"key":"730_CR40","doi-asserted-by":"crossref","unstructured":"Kallberg, J., Thuraisingham, B.: Towards cyber operations\u2014the new role of academic cyber security research and rducation. In: IEEE International Conference on Intelligence and Security Informatics. Arlington, VA, pp. 132\u2013134, Jun 11\u201314 2014","DOI":"10.1109\/ISI.2012.6284146"},{"key":"730_CR41","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Moschos, T., Geneiatakis, D., Gritzalis, S.: Detecting DNS amplification attacks. In: Ctitical Information Infrastructures Security, Second International Workshop. M\u00e1laga, Spain, pp. 185\u2013196, Oct 3\u20135 2007","DOI":"10.1007\/978-3-540-89173-4_16"},{"key":"730_CR42","unstructured":"Karimazad, R., Faraahi, A.: An anomaly based method for DDoS attacks detection using RBF neural networks. In: Proceedings of the International Conference on Network and Electronics Engineering. Singapore, pp. 44\u201348, Sept 16\u201318 2011"},{"key":"730_CR43","unstructured":"Kovacs, E.: LOIC DDOS Attack Tool Migrated to Android. Softpedia. http:\/\/news.softpedia.com\/news\/LOIC-DDOS-Attack-Tool-Migrated-to-Android-254119.shtml (2012). Accessed 01 Nov 2014"},{"key":"730_CR44","unstructured":"Leder, F., Werner, T., Martini, P.: Proactive botnet countermeasures an offensive approach. Cooperative Cyber Defence Centre of Excellence. https:\/\/ccdcoe.org\/publications\/virtualbattlefield\/15_LEDER_Proactive_Coutnermeasures.pdf (2009). Accessed 12 Nov 2016"},{"key":"730_CR45","unstructured":"Loshin, P.: Details Emerging on Dyn DNS DDoS Attack, Mirai IoT Botnet. TechTarget SearchSecurity. http:\/\/searchsecurity.techtarget.com\/news\/450401962\/Details-emerging-on-Dyn-DNS-DDoS-attack-Mirai-IoT-botnet (2016). Accessed 12 Nov 2016"},{"key":"730_CR46","unstructured":"Margaritelli, S.: Announcement: dSploit merges with ZImperium zANTI2. ZImperium. http:\/\/dsploit.net\/ (2014). Accessed 01 Nov 2014"},{"key":"730_CR47","volume-title":"Cloud Security and Privacy","author":"T Mather","year":"2009","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O\u2019Reilly Media, Sebastopol (2009)"},{"key":"730_CR48","volume-title":"Internet Denial of Service: Attack and Defence Mechanisms","author":"J Mirkovi\u0107","year":"2004","unstructured":"Mirkovi\u0107, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defence Mechanisms. Pearson Education, Stoughton (2004)"},{"issue":"2","key":"730_CR49","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"349","author":"J Mirkovi\u0107","year":"2004","unstructured":"Mirkovi\u0107, J., Reiher, P.: A taxonomy of DDoS attacks and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 349(2), 39\u201354 (2004). doi: 10.1145\/997150.997156","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"730_CR50","unstructured":"Montoro, R.: Quick Analysis of a DDoS Attack Using SSDP. Sucuri. http:\/\/blog.sucuri.net\/2014\/09\/quick-analysis-of-a-ddos-attack-using-ssdp.html (2014). Accessed 01 Nov 2014"},{"key":"730_CR51","unstructured":"Moore, H.D.: Metasploit Framework (MSF). Rapid7. http:\/\/www.metasploit.com\/ (2013). Accessed 15 Oct 2013"},{"key":"730_CR52","doi-asserted-by":"crossref","unstructured":"Munz, G., Carle, G.: Real-time analysis of flow data for network attack detection. In: Proceedings of the 10th IFIP\/IEEE International Symposium on Integrated Network Management. Munich, Germany, pp. 100\u2013108, May 21\u201325 2007","DOI":"10.1109\/INM.2007.374774"},{"key":"730_CR53","doi-asserted-by":"crossref","unstructured":"Narasimhan, H., Varadarjan, V., Rangan, C.: Game theoretic resistance to denial of service attacks using hidden difficulty puzzles. In: Proceedings of the 6th international conference on Information Security Practice and Experience. Seoul, Korea, pp. 359\u2013376, May 12\u201313 2010","DOI":"10.1007\/978-3-642-12827-1_26"},{"key":"730_CR54","unstructured":"Neustar. HTTP GET Flood DDoS Attack, aka HTTP Object Request Flood. Neustar. http:\/\/www.ddosattacks.biz\/attacks\/http-post-flood-ddos-attack-definition-mitigation (2013). Accessed 01 Nov 2014"},{"issue":"5","key":"730_CR55","first-page":"36","volume":"1","author":"T Nice","year":"2013","unstructured":"Nice, T., Mathew, A.: Different types of port-hopping methods used to prevent DDoS attacks. Int. J. Comput. Sci. Res. Technol. 1(5), 36\u201337 (2013)","journal-title":"Int. J. Comput. Sci. Res. Technol."},{"key":"730_CR56","unstructured":"NSFOCUS Ltd., Mid-Year DDoS Threat Report, Technical Report 2013\u201307, p. 2013. NSFOCUS Ltd, Beijing (2013)"},{"key":"730_CR57","unstructured":"oCERT. 2011-003 Multiple Implementations Denial-of-Service via Hash Algorithm Collision. oCERT. http:\/\/www.ocert.org\/advisories\/ocert-2011-003.html (2011). Accessed 01 Nov 2014"},{"key":"730_CR58","unstructured":"Offensive Security. Kali Linux NetHunter. Offensive Security. http:\/\/www.nethunter.com\/ (2014). Accessed 01 Nov 2014"},{"key":"730_CR59","unstructured":"Orchilles, J.: Multiple Vendor SSL\/TLS Renegotiation Denial Of Service Vulnerability. SecurityFocus. http:\/\/www.securityfocus.com\/bid\/48626 (2011). Accessed 15 Nov 2013"},{"key":"730_CR60","unstructured":"Orchilles, J.: TLS\/SSL Renegotiation DoS. Internet Engineering Task Force. http:\/\/www.ietf.org\/mail-archive\/web\/tls\/current\/msg07553.html (2006). Accessed 15 Nov 2013"},{"key":"730_CR61","unstructured":"Prolexic Ltd. Prolexic Quarterly Global DDoS Attack Report. Technical Report 2013-07. Hollywood: Prolexic Ltd. (2013)"},{"key":"730_CR62","unstructured":"Radware Inc. DefencePro: Real-Time, Behavioral Based Attack Mitigation. Radware Inc. http:\/\/www.radware.com\/Products\/DefencePro\/ (2013). Accessed 15 Oct 2013"},{"key":"730_CR63","unstructured":"Radware Inc. Global Application and Network Security Report 2013. Technical Report 2013-01. Mahwah: Radware Inc. (2013)"},{"key":"730_CR64","unstructured":"Radware Inc. Global Application and Network Security Report 2015\u20132016. Technical Report 2016-01. Mahwah: Radware Inc. (2016)"},{"issue":"1","key":"730_CR65","first-page":"751","volume":"3","author":"V Reddy","year":"2013","unstructured":"Reddy, V., Rani, S., Vedika, J., Reddy, C.: Game theory based defense strategy against denial of service attack using puzzles. J. Eng. Res. Appl. (IJERA) 3(1), 751\u2013757 (2013)","journal-title":"J. Eng. Res. Appl. (IJERA)"},{"key":"730_CR66","unstructured":"Robish, E.: Decloak Wiki. SourceForge. http:\/\/sourceforge.net\/p\/adhd\/wiki\/Decloak\/ (2013). Accessed 15 Oct 2013"},{"key":"730_CR67","unstructured":"Robish, E., Johnson, K., Stand, J.: Active Defence Harbinger Distribution (ADHD). SourceForge. http:\/\/sourceforge.net\/projects\/adhd (2013). Accessed 15 Oct 2013"},{"issue":"8","key":"730_CR68","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.neucom.2015.04.101","volume":"172","author":"A Saied","year":"2016","unstructured":"Saied, A., Overill, R., Radzik, T.: Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172(8), 385\u2013393 (2016)","journal-title":"Neurocomputing"},{"key":"730_CR69","unstructured":"Schneier, B.: Attributing the Sony Attack. Schneier on Security. https:\/\/www.schneier.com\/blog\/archives\/2015\/01\/attributing_the.html (2015). Accessed 12 Nov 2016"},{"key":"730_CR70","unstructured":"Security TechCenter. Microsoft Security Bulletin MS12-020. Security TechCenter. http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-020 (2012). Accessed 15 Oct 2013"},{"key":"730_CR71","doi-asserted-by":"crossref","DOI":"10.1201\/9781439863961","volume-title":"Reliable Computer Systems: Design and Evaluation","author":"D Siewiorek","year":"1998","unstructured":"Siewiorek, D., Swarz, R.: Reliable Computer Systems: Design and Evaluation. A K Peters\/CRC Press, Natick (1998)"},{"key":"730_CR72","unstructured":"Sriram, I., Hosseni, A.: Research, Agenda in Cloud Technology. In: 1st ACM Symposium on Cloud Computing, 10\u201311. Indianapolis, IN, USA (2010 Jun)"},{"key":"730_CR73","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your botnet is my botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. Chicago, IL, USA, pp. 635\u2013647, Nov 9-13 2009","DOI":"10.1145\/1653662.1653738"},{"key":"730_CR74","unstructured":"Sysoev, I.: Nginx. Nginx. http:\/\/nginx.org\/en\/ (2013). Accessed 15 Nov 2013"},{"key":"730_CR75","unstructured":"The Hacker\u2019s Choice (THC). THC-SSL-DoS. THC. https:\/\/www.thc.org\/thc-ssl-dos\/ (2011) Accessed 15 Oct 2013"},{"issue":"20","key":"730_CR76","first-page":"11","volume":"41","author":"S Vivinsandar","year":"2012","unstructured":"Vivinsandar, S., Shenai, S.: Economic denial of sustainability (edos) in cloud services using HTTP and XML based DDoS attacks. Int. J. Comput. Appl. 41(20), 11\u201316 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"730_CR77","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1731060.1731063","volume":"28","author":"M Walfish","year":"2010","unstructured":"Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS defense by offense. ACM Trans. Comput. Syst. (TOCS) 28(1), 3\u201357 (2010). doi: 10.1145\/1731060.1731063","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"730_CR78","unstructured":"Wueest, C.: Security Response: The Continued Rise of DDoS Attacks. Technical Report 2014-10. Mountain View, CA: Symantec Corporation (2014)"},{"key":"730_CR79","doi-asserted-by":"crossref","unstructured":"Zhao, L., Iyer, R., Makineni, S., Bhuyan, L.: Anatomy and performance of SSL processing. In: IEEE International Symposium on Performance Analysis of Systems and Software. Austin, TX, USA, pp. 197\u2013206, Mar 20\u201322 2005","DOI":"10.1109\/ISPASS.2005.1430574"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0730-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0730-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0730-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T17:14:56Z","timestamp":1749921296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0730-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,19]]},"references-count":79,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["730"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0730-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,19]]}}}