{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:10:41Z","timestamp":1725660641793},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsn.2012.6263945","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T16:04:08Z","timestamp":1345133048000},"page":"1-12","source":"Crossref","is-referenced-by-count":5,"title":["Epiphany: A location hiding architecture for protecting critical services from DDoS attacks"],"prefix":"10.1109","author":[{"given":"Vamsi","family":"Kambhampati","sequence":"first","affiliation":[]},{"given":"Christos","family":"Papadopolous","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Massey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Operation of anycast services","author":"abley","year":"0","journal-title":"RFC 4786"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.022"},{"journal-title":"ICANN Anycast Saved DNS Root Servers During Attack","year":"0","author":"naraine","key":"18"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/11957454_13","article-title":"Valet services: Improving hidden servers with a personal touch","author":"\ufffdverlier","year":"2006","journal-title":"Privacy Enhancing Technologies"},{"key":"16","article-title":"Network capabilities: The good, the bad and the ugly","author":"argyraki","year":"2005","journal-title":"Hotnets-IV"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826279"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"12","article-title":"Mayday: Distributed filtering for internet services","author":"andersen","year":"2003","journal-title":"USENIX USITS"},{"key":"21","article-title":"Defending against denial-of-service attacks with puzzle auctions","author":"wang","year":"2003","journal-title":"IEEE SSP"},{"key":"20","article-title":"Using uncleanliness to predict future botnet addresses","author":"patrick","year":"2007","journal-title":"IMC"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1145\/1151659.1159948","article-title":"DDoS defense by offense","author":"walfish","year":"2006","journal-title":"ACM SIGCOMM"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"24","article-title":"Phalanx: Withstanding multimillion-node botnets","author":"dixon","year":"2008","journal-title":"NSDI"},{"journal-title":"The Internet Topology Data Kit - 2011-04","year":"0","key":"25"},{"key":"26","article-title":"Source-specific multicast for IP","author":"holbrook","year":"0","journal-title":"RFC 4607"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1145\/1090191.1080127","article-title":"Towards a global IP anycast service","author":"ballani","year":"2005","journal-title":"SIGCOMM"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972383"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1145\/1368310.1368336","article-title":"SNAPP: Stateless network-authenticated path pinning","author":"parno","year":"2008","journal-title":"ASIACCS"},{"journal-title":"Akamai Technologies","year":"0","key":"3"},{"journal-title":"Siteprotect System","year":"0","key":"2"},{"key":"10","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"USENIX"},{"journal-title":"Worldwide Infrastructure Security Report - Volume VI","year":"2010","key":"1"},{"key":"30","article-title":"Active internet traffic filtering: Real time response to denial-of-service attacks","author":"argyraki","year":"2005","journal-title":"USENIX"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402981"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347560","article-title":"Practical network support for IP traceback","author":"savage","year":"2000","journal-title":"ACM SIGCOMM"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/1090191.1080120","article-title":"A DoS-limiting network architecture","author":"yang","year":"2005","journal-title":"ACM SIGCOMM"}],"event":{"name":"2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2012,6,25]]},"location":"Boston, MA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6253623\/6263904\/06263945.pdf?arnumber=6263945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:56:16Z","timestamp":1497984976000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6263945\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dsn.2012.6263945","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}