{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T10:45:06Z","timestamp":1710931506375},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2014,8,6]],"date-time":"2014-08-06T00:00:00Z","timestamp":1407283200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11042-014-2100-5","type":"journal-article","created":{"date-parts":[[2014,8,5]],"date-time":"2014-08-05T03:46:14Z","timestamp":1407210374000},"page":"6341-6363","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Service-oriented DDoS detection mechanism using pseudo state in a flow router"],"prefix":"10.1007","volume":"74","author":[{"given":"PyungKoo","family":"Park","sequence":"first","affiliation":[]},{"given":"SeongMin","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"HoYong","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Jaehyung","family":"Park","sequence":"additional","affiliation":[]},{"given":"Cheol Hong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Su-il","family":"Choi","sequence":"additional","affiliation":[]},{"given":"JaeCheol","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,6]]},"reference":[{"key":"2100_CR1","unstructured":"BBC News, New \u2018cyber attacks\u2019 hit S Korea, 2009-07-09"},{"key":"2100_CR2","unstructured":"Bellovin SM (2000) ICMP traceback messages. Work in progress, internet draft draftbellovin-itrace-00.txt"},{"key":"2100_CR3","unstructured":"Binstock A (1996) Hashing rehashed: is RAM spped making your hashing less efficient? Dr. Dobb\u2019s J vol. 4, no. 2"},{"key":"2100_CR4","unstructured":"Black JR Jr., Martel CU, Qi H (1998) Graph and hashing algorithms for modern architectures: Design and performance. In Proceedings of the 2nd Workshop on Algorithm Engineering (WAE\u201998), Saarbrucken, Germany"},{"key":"2100_CR5","doi-asserted-by":"crossref","unstructured":"Broder A, Mitzenmacher M (2001) Using multiple hash functions to improve IP lookups. In Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2001), Anchorage, AK","DOI":"10.1109\/INFCOM.2001.916641"},{"key":"2100_CR6","unstructured":"Charette C (2011) Distributed denial of service attacks flare up. IEEE spectrum"},{"key":"2100_CR7","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1109\/TPDS.2007.70817","volume":"19","author":"C Gong","year":"2008","unstructured":"Gong C, Sarac K (2008) A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Trans Parallel Distributed Syst 19:1310\u20131324","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"2100_CR8","unstructured":"Hillier FS, Lieberman GJ (2001) Introduction to operations research, 7th ed. McGraw-Hill Higher Education"},{"key":"2100_CR9","unstructured":"Internet Website: http:\/\/ita.ee.lbl.gov\/html\/contrib\/WorldCup.html"},{"key":"2100_CR10","unstructured":"Internet Website: http:\/\/www.cavium.com\/"},{"key":"2100_CR11","unstructured":"Internet Website: http:\/\/www.sablenetworks.com\/index.php\/en\/"},{"key":"2100_CR12","unstructured":"Ioannidis J, Bellovin SM (2002) Implementing pushback: router-based defense against DDoS Attacks. Proc. NDSS\u20192002"},{"key":"2100_CR13","doi-asserted-by":"crossref","unstructured":"Jin C, Wang H, Shin KG (2003) Hop-count filtering: an effective defense against spoofed DDoS Traffic. Proceeding of the 10th ACM Conference on Computer and Communications Security","DOI":"10.1145\/948109.948116"},{"key":"2100_CR14","unstructured":"Kuzmanovic A, Knightly EW (2001) Low-rate TCP-Targeted denial of service attacks and counter strategies. IEEE\/ACM Transactions to Improve IP Lookups, INFOCOM 2001. Twentieth, ieeexplore.ieee.org"},{"key":"2100_CR15","doi-asserted-by":"crossref","unstructured":"Lau F, Rubin SH, Smith MH, et al. (2000) Distributed denial of service attacks. 2000 IEEE International Conference on Systems, Man, and Cybernetics","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"2100_CR16","unstructured":"Litwin W (1980) Linear hashing: a new tool for file and table addressing. In proceeding of: Sixth International Conference on Very Large Data Bases, October 1\u20133, 1980, Montreal, Quebec, Canada, Proceedings"},{"key":"2100_CR17","doi-asserted-by":"crossref","unstructured":"Paxson V (2006) End-to-end routing behavior in the internet. IEEE\/ACM Transaction on Networking, pp. 601\u2013615","DOI":"10.1145\/1163593.1163602"},{"key":"2100_CR18","unstructured":"Shon T, Kim Y, Lee C, et al (2005) A machine learning framework for network anomaly detection using SVM and GA. The Sixth Annual IEEE SMC"},{"key":"2100_CR19","unstructured":"Tanachaiwiwiat S, Hwang K (2003) Differential packet filtering against DDoS flood attacks. Proc. ACM Conference on Computer and Communications Security (CCS)"},{"key":"2100_CR20","doi-asserted-by":"crossref","unstructured":"Waldvogel M, Varghese G, Turner J (1997) Scalable high speed IP routing lookups. dl.acm.org","DOI":"10.1145\/263105.263136"},{"key":"2100_CR21","unstructured":"Wang H, Zhang D, Shin KG (2002) Detecting SYN Flooding Attacks. INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. Vol 3, 1530\u20131539"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2100-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2100-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2100-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T11:22:39Z","timestamp":1565695359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2100-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,6]]},"references-count":21,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["2100"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2100-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,6]]}}}