{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:29:21Z","timestamp":1740101361172,"version":"3.37.3"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF OAC-1739034"],"award-info":[{"award-number":["NSF OAC-1739034"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"NWO","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041415","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"513-521","source":"Crossref","is-referenced-by-count":3,"title":["Defending Root DNS Servers Against DDoS Using Layered Defenses"],"prefix":"10.1109","author":[{"given":"A S M","family":"Rizvi","sequence":"first","affiliation":[{"name":"University of Southern California \/ Information Sciences Institute"}]},{"given":"Jelena","family":"Mirkovic","sequence":"additional","affiliation":[{"name":"University of Southern California \/ Information Sciences Institute"}]},{"given":"John","family":"Heidemann","sequence":"additional","affiliation":[{"name":"University of Southern California \/ Information Sciences Institute"}]},{"given":"Wesley","family":"Hardaker","sequence":"additional","affiliation":[{"name":"University of Southern California \/ Information Sciences Institute"}]},{"given":"Robert","family":"Story","sequence":"additional","affiliation":[{"name":"University of Southern California \/ Information Sciences Institute"}]}],"member":"263","reference":[{"volume-title":"Root server operations","year":"2015","key":"ref1"},{"volume-title":"Root server operations","year":"2016","key":"ref2"},{"article-title":"ANT datasets","volume-title":"Datasets with Anomaly keywords","year":"2022","key":"ref3"},{"volume-title":"Canadian comms company suffers DDoS attack","year":"2021","author":"Adriano","key":"ref4"},{"volume-title":"A look back at the DDoS trends of 2018","year":"2017","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365863"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224398"},{"key":"ref9","article-title":"President of Chicago ISOC","author":"Slater","year":"2002","journal-title":"The Internet Outage and Attacks of October 2002"},{"volume-title":"Stonefish-automating DDoS mitigation at the edge","year":"2019","author":"Blazina","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815717"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2010.5619917"},{"volume-title":"Ddos attack trends for 2020","year":"2020","author":"Warbuton","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1036038"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70224"},{"volume-title":"2021: Volumetric DDoS attacks rising fast","author":"Emmons","key":"ref16"},{"volume-title":"L4Drop: XDP DDoS mitigations","year":"2018","author":"Fabre","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2827"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.116"},{"volume-title":"Analyzing and mitigating privacy with the DNS root service","year":"2018","author":"Hardaker","key":"ref20"},{"volume-title":"Root server attack on","year":"2007","key":"ref21"},{"volume-title":"Using the response rate limiting feature","year":"2018","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131383"},{"key":"ref25","first-page":"287","article-title":"Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds","volume-title":"Proc. USENIX NSDI","author":"Kandula"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8109"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472891"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8806"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5782"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355568"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987446"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.62"},{"volume-title":"NETSCOUT Arbors 13th annual worldwide infrastructure security report","year":"2019","key":"ref34"},{"volume-title":"Github servived the biggest DDoS attack ever recorded","year":"2018","author":"Newman","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199191"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028790"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24693-0_63"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24232"},{"key":"ref40","first-page":"4201","article-title":"Anycast agility: Network playbooks to fight DDoS","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Rizvi"},{"volume-title":"Dynamically selecting defenses to DDoS for DNS (extended)","year":"2019","author":"Rizvi","key":"ref41"},{"volume-title":"Lessons from the Dyn DDoS attack","year":"2016","author":"Schneier","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405881"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233709"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet51028.2020.9335812"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78375-4_14"},{"volume-title":"DDoS attack that disrupted internet was largest of its kind in history, experts say","year":"2016","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194869"},{"volume-title":"Azure DDoS protection-2021 Q1 and Q2 DDoS attack trends","year":"2021","author":"Toh","key":"ref49"},{"volume-title":"Ddos defense in depth for dns (ddidd) tools","year":"2022","key":"ref50"},{"volume-title":"Events of 21-Oct-2002","year":"2002","author":"Vixie","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181415"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"},{"volume-title":"Who DDoSd Austin?","year":"2019","author":"Yoachimik","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5496886"},{"volume-title":"Cloudflare says it stopped the largest DDoS attack ever reported","year":"2020","key":"ref57"},{"volume-title":"Dnsanon: extract DNS traffic from pcap to text with optionally anonymization","year":"2017","author":"Zhu","key":"ref58"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2023,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041415.pdf?arnumber=10041415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:40:32Z","timestamp":1707835232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041415","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}