{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:21:18Z","timestamp":1725704478736},"reference-count":29,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dance.2002.1003493","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T20:30:39Z","timestamp":1056573039000},"page":"193-203","source":"Crossref","is-referenced-by-count":14,"title":["Active network based DDoS defense"],"prefix":"10.1109","author":[{"given":"D.","family":"Sterne","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K.","family":"Djahandari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Balupari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W.","family":"La Cholter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Babson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Wilson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Narasimhan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Purtell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Schnackenberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Linden","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Implementing Pushback: Router-Based Defense Against DDoS Attacks","author":"ioannidis","year":"2002","journal-title":"Proc Symp Network and Distributed System Security"},{"journal-title":"The ISI Active Reservation Protocol Project","year":"0","key":"ref11"},{"journal-title":"Programming and Deploying Java Mobile Agents with Aglets","year":"1998","author":"lange","key":"ref12"},{"journal-title":"The Java Virtual Machine Specification","year":"1999","author":"lindholm","key":"ref13"},{"key":"ref14","article-title":"The BSD Packet Filter: A New Architecture for User-Level Packet Capture","author":"mccanne","year":"1993","journal-title":"Proceedings of the 1993 Winter USENIX Technical Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2001.916839"},{"journal-title":"NetFilter","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.1999.758497"},{"journal-title":"The PIRF Project","year":"0","key":"ref18"},{"key":"ref19","article-title":"NodeOS Interface Specification","author":"peterson","year":"0","journal-title":"and Active Networks Node OS Working Group"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.1998.662048"},{"journal-title":"CERT&#x00AE; Advisory CA-2000&#x2013;01 Denial-of-Service Developments","year":"0","key":"ref4"},{"key":"ref27","article-title":"A Defense Against Address Spoofing Using Active Networks","author":"van","year":"1997","journal-title":"masters thesis"},{"key":"ref3","article-title":"Active Network Working Group","author":"calvert","year":"0","journal-title":"Architectural framework for active networks version 1 0"},{"key":"ref6","first-page":"229","article-title":"Router Plugins: A Software Architecture for Next Generation Routers","author":"decasper","year":"1998","journal-title":"Proceedings of SIGCOMM '98"},{"key":"ref29","article-title":"SOFTNET: An Approach to High Level Packet Communication","author":"zander","year":"1983","journal-title":"Proc American Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45451-9_1"},{"key":"ref8","article-title":"Denying Denial-of-Service","author":"harris","year":"2001","journal-title":"Information Security Magazine"},{"key":"ref7","article-title":"Distributed Network Defense","author":"frincke","year":"0","journal-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security"},{"key":"ref2","article-title":"A Method of Tracing Intruders using Mobile Agents","author":"asaka","year":"1999","journal-title":"INET 99"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751668"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45451-9_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/49.917708"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932192"},{"key":"ref21","article-title":"Infrastructure for Intrusion Detection and Response","author":"schnackenberg","year":"2000","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"},{"key":"ref24","article-title":"Active Networks Intrusion Detection and Response (AN-IDR)","author":"sterne","year":"2000","journal-title":"DARPA Fault Tolerant Networks Program Principal Investigators Meeting"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.1999.758557"},{"key":"ref26","article-title":"Active Networks","author":"tennenhouse","year":"1995","journal-title":"Symposium on Operating Systems Principles"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45474-8_9"}],"event":{"name":"DARPA Active Networks Conference and Exposition","acronym":"DANCE-02","location":"San Francisco, CA, USA"},"container-title":["Proceedings DARPA Active Networks Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7864\/21659\/01003493.pdf?arnumber=1003493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T23:48:30Z","timestamp":1489189710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1003493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dance.2002.1003493","relation":{},"subject":[]}}