{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:22:13Z","timestamp":1746804133638,"version":"3.40.5"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/est.2017.8090411","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T22:42:25Z","timestamp":1509662545000},"page":"128-133","source":"Crossref","is-referenced-by-count":7,"title":["HTTP\/2 Tsunami: Investigating HTTP\/2 proxy amplification DDoS attacks"],"prefix":"10.1109","author":[{"given":"David","family":"Beckett","sequence":"first","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"RFC 7541 HPACK Header Compression for HTTP\/2)","year":"2015","key":"ref4"},{"journal-title":"Hypertext Transfer Protocol Version 2 (HTTP\/2) RFC 7540","year":"2015","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0528-7"},{"journal-title":"UDP-based Amplification Attacks","year":"2014","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2015.7292994"},{"journal-title":"Usage of HTTP\/2 broken down by web servers","year":"2017","key":"ref5"},{"journal-title":"HTTP\/2 In-depth analysis of the top four flaws of the next generation protocol","year":"2016","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102170"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"journal-title":"Breaking down Mirai Botnet","year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.006"},{"journal-title":"WORLDWIDE INFRASTRUCTURE SECU-RITY REPORT XII 2017","year":"2017","author":"networks","key":"ref1"}],"event":{"name":"2017 Seventh International Conference on Emerging Security Technologies (EST)","start":{"date-parts":[[2017,9,6]]},"location":"Canterbury","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 Seventh International Conference on Emerging Security Technologies (EST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8078162\/8090385\/08090411.pdf?arnumber=8090411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T16:11:48Z","timestamp":1513181508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8090411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/est.2017.8090411","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}