{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:57:13Z","timestamp":1775145433187,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/atnac.2017.8215430","type":"proceedings-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T18:16:59Z","timestamp":1513621019000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Dynamic attack mitigation using SDN"],"prefix":"10.1109","author":[{"given":"Sharon","family":"Ezekiel","sequence":"first","affiliation":[]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[]},{"given":"Mohan","family":"Gurusamy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-319-30505-9_24","article-title":"Blackholing at ixps: On the effectiveness of ddos mitigation in the wild","author":"dietzel","year":"2016","journal-title":"17th Int'l Conf on Passive and Active Measurement (PAM 2016)"},{"key":"ref3","author":"hilton","year":"0","journal-title":"Dyn Analysis Summary of DDoS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2016.7566750"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978306"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.2234"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"ref8","year":"0","journal-title":"Cloudfare DDoS protection"},{"key":"ref7","first-page":"817","article-title":"Bohatei: Flexible and Elastic DDoS Defense","author":"fayaz","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC'15"},{"key":"ref2","article-title":"State of the Internet\/Security Report","year":"2016","journal-title":"Akamai Technologies Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813633"},{"key":"ref1","author":"paganini","year":"0","journal-title":"150 000 IoT devices behind the 1 Tbps DDoS attack on OVH"}],"event":{"name":"2017 27th International Telecommunication Networks and Applications Conference (ITNAC)","location":"Melbourne, VIC","start":{"date-parts":[[2017,11,22]]},"end":{"date-parts":[[2017,11,24]]}},"container-title":["2017 27th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8169969\/8215343\/08215430.pdf?arnumber=8215430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T16:07:21Z","timestamp":1643126841000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8215430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/atnac.2017.8215430","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}