{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:02:34Z","timestamp":1773777754875,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/est.2017.8090408","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T22:42:25Z","timestamp":1509662545000},"page":"108-113","source":"Crossref","is-referenced-by-count":9,"title":["HTTP\/2 Cannon: Experimental analysis on HTTP\/1 and HTTP\/2 request flood DDoS attacks"],"prefix":"10.1109","author":[{"given":"David","family":"Beckett","sequence":"first","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","year":"2015","journal-title":"Hypertext Transfer Protocol Version 2 (HTTP\/2) RFC 7540"},{"key":"ref3","year":"2016","journal-title":"Say Cheese a snapshot of the massive DDoS attacks coming from Io'T cameras"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2015.7292994"},{"key":"ref6","year":"2015","journal-title":"RFC Draft QUIC A UDP-Based Secure and Reliable Transport for HTTP\/2)"},{"key":"ref11","year":"2016","journal-title":"HTTP\/2 In-depth analysis of the top four flaws of the next generation protocol"},{"key":"ref5","year":"2015","journal-title":"RFC 7541 HPACK Header Compression for HTTP\/2)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.127"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2390317.2390321"},{"key":"ref2","year":"2015","journal-title":"State of the Internet Q2 2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0528-7"},{"key":"ref1","author":"networks","year":"2017","journal-title":"WORLDWIDE INFRASTRUCTURE SE-CURITY REPORT XII 2017"}],"event":{"name":"2017 Seventh International Conference on Emerging Security Technologies (EST)","location":"Canterbury","start":{"date-parts":[[2017,9,6]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 Seventh International Conference on Emerging Security Technologies (EST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8078162\/8090385\/08090408.pdf?arnumber=8090408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:28:16Z","timestamp":1512671296000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8090408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/est.2017.8090408","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}