{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T06:12:32Z","timestamp":1673590352438},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T00:00:00Z","timestamp":1381968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s11227-013-1031-7","type":"journal-article","created":{"date-parts":[[2013,10,16]],"date-time":"2013-10-16T15:33:01Z","timestamp":1381937581000},"page":"820-836","source":"Crossref","is-referenced-by-count":2,"title":["sShield: small DDoS defense system using RIP-based traffic deflection in autonomous system"],"prefix":"10.1007","volume":"67","author":[{"given":"Ho-Seok","family":"Kang","sequence":"first","affiliation":[]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,17]]},"reference":[{"key":"1031_CR1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/ICNP.2011.6089077","volume-title":"Proc of the 19th IEEE international conference on network protocols (ICNP 2011)","author":"E Klisne","year":"2011","unstructured":"Klisne E, Afanasyev A, Reiher P (2011) Shield: dos filtering using traffic deflecting. In: Proc of the 19th IEEE international conference on network protocols (ICNP 2011), Vancouver, pp 37\u201342"},{"key":"1031_CR2","unstructured":"Trustwave SpiderLabs (2011). The web hacking incident database semiannual report, July to December 2010. Technical report, Computer Science in Trustwave SpiderLabs"},{"key":"1031_CR3","unstructured":"Garg K, Chawla R (2011) Detection of DDoS attacks using data mining. Int J Comput Bus Res 2(1)"},{"key":"1031_CR4","doi-asserted-by":"crossref","unstructured":"Peng T, Lecke C, Ramanohanarao K (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1)","DOI":"10.1145\/1216370.1216373"},{"key":"1031_CR5","doi-asserted-by":"crossref","unstructured":"Mirkovic J, Reiher P (2004) A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, ACM SIGCOMM 34(2)","DOI":"10.1145\/997150.997156"},{"key":"1031_CR6","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/ACSAC.2009.32","volume-title":"Proc of annual computer security applications conference (ASAC 2009)","author":"E Klisne","year":"2009","unstructured":"Klisne E, Beaumont-Gay M, Mirkovic J, Reiher P (2009) RAD: Reflector attack defense using message authentication codes. In: Proc of annual computer security applications conference (ASAC 2009), Honolulu. IEEE Press, New York, pp 269\u2013278."},{"key":"1031_CR7","unstructured":"Zaroo P (2002) A survey of DDoS attacks and some DDoS defense mechanisms. Advanced Information Assurance (CS 626)"},{"key":"1031_CR8","doi-asserted-by":"crossref","unstructured":"Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267 technical report, The Internet Society","DOI":"10.17487\/rfc2827"},{"key":"1031_CR9","first-page":"319","volume-title":"Proc of the USENIX large installation systems administration conference","author":"H Burch","year":"2000","unstructured":"Burch H, Cheswick B (2000) Tracing anonymous packets to their approximate source. In: Proc of the USENIX large installation systems administration conference, New Orleans, pp 319\u2013327"},{"key":"1031_CR10","doi-asserted-by":"crossref","unstructured":"Savage S, Wetherall D, Karlin A, Anderson T (2000) Practical network support for IP traceback. Technical report, Department of Computer Science and Engineering, University of Washington","DOI":"10.1145\/347059.347560"},{"key":"1031_CR11","first-page":"43","volume-title":"Proc of 4th international workshop on managing insider security threats (MIST 2012, JISIS)","author":"H-S Kang","year":"2012","unstructured":"Kang H-S, Kim S-R (2012) Design and experiments of small DDoS defense system using traffic deflecting in autonomous system. In: Proc of 4th international workshop on managing insider security threats (MIST 2012, JISIS), vol\u00a02, pp 43\u201353"},{"key":"1031_CR12","volume-title":"Proc of International conference on web-management for international organisations","author":"NA Noureldien","year":"2002","unstructured":"Noureldien NA (2002) Protecting web servers from DoS\/DDoS flooding attacks: a technical overview. In: Proc of International conference on web-management for international organisations, Geneva"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1031-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-1031-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1031-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T22:21:09Z","timestamp":1564525269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-1031-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,17]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["1031"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-1031-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,17]]}}}