{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:01:34Z","timestamp":1767337294984,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194869","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"14-25","source":"Crossref","is-referenced-by-count":34,"title":["NetBouncer: client-legitimacy-based high-performance DDoS filtering"],"prefix":"10.1109","author":[{"given":"R.","family":"Thomas","sequence":"first","affiliation":[]},{"given":"B.","family":"Mark","sequence":"additional","affiliation":[]},{"given":"T.","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"J.","family":"Croall","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Using client puzzles to protect TLS","author":"dean","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/263109.263133"},{"key":"ref12","article-title":"Analysis and simulation of a fair queueing algorithm","volume":"1","author":"demers","year":"1990","journal-title":"Internetworking Research and Experience"},{"key":"ref13","article-title":"Analyzing Distributed Denial of Service Tools","author":"dietrich","year":"2000","journal-title":"The Shaft Case Proceedings of the LISA XIV"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ATM.1999.786852"},{"key":"ref15","article-title":"an improved MIC for 802.11 WEP","author":"ferugson michael","year":"2002","journal-title":"IEEE P802 11 Wireless LANs MacFergus Bart de Ligtstraat 64 1097 JE Amsterdam Netherlands"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/INFCOM.1994.337677","article-title":"A Self-Clocked Fair Queuing Scheme for Broadband Applications","author":"golestani","year":"1994","journal-title":"Proc IEEE INFOCOM'94"},{"key":"ref17","article-title":"Controlling High Bandwidth Aggregates in the network","author":"mahajan","year":"2001","journal-title":"AT&T Center for Internet Research at ICSI"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/321479.321481"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/INFCOM.1993.253403"},{"year":"0","article-title":"Asta vantage System, Asta Networks","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","journal-title":"White Paper Cisco Systems","article-title":"Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks","key":"ref6"},{"key":"ref5","article-title":"Minimizing the Effects of DoS Attacks","author":"capshaw","year":"2000","journal-title":"Application Note Juniper networks"},{"year":"0","article-title":"Configuring TCP Intercept (Prevent Denial-of Service Attacks), CISCO Systems","key":"ref8"},{"year":"1999","journal-title":"Cisco System Technical Note","article-title":"Characterizing and Tracing Packet Floods Using Cisco Routers","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref9"},{"year":"0","author":"bernstein","article-title":"SYN Cookies","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-0-387-35378-4_2"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/383059.383061"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/90.234856"},{"key":"ref24","article-title":"High-speed Legitimacy-based DDoS Packet Filtering with Network Processors: A Case Study and Implementation on the Intel IXP1200","author":"thomas","year":"2003","journal-title":"Proc Second Workshop Network Processors"},{"key":"ref23","article-title":"Infrastructure for Intrusion Detection and Response","author":"schnackenberg","year":"2000","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"},{"key":"ref25","article-title":"Bernhard Plattner, Scalable High Speed IP Routing Lookups","author":"waldvogel","year":"0","journal-title":"Proceedings of SIGCOMM '97"}],"event":{"acronym":"DISCEX-03","name":"DARPA Information Survivability Conference and Exposition","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194869.pdf?arnumber=1194869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:04:38Z","timestamp":1497571478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194869","relation":{},"subject":[]}}