{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:15:11Z","timestamp":1729635311792,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6364105","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T05:17:44Z","timestamp":1354598264000},"page":"1048-1052","source":"Crossref","is-referenced-by-count":2,"title":["DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense"],"prefix":"10.1109","author":[{"given":"Majing","family":"Su","sequence":"first","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bingxing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Incorporating trust in the bittorrent protocol","author":"shah","year":"2007","journal-title":"2007 Int Symp Performance Evaluation of Comput and Telecommun Syst"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366131"},{"journal-title":"BitTorrent Peer Exchange Conventions [Online]","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.26"},{"journal-title":"BitTorrent Extension Protocol","year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.26"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502541"},{"key":"11","first-page":"261","article-title":"A BT-driven distributed denial-of-service attack","author":"harrington","year":"2007","journal-title":"Proc 3rd IEEE Int Conf Security and Privacy in Commun Networks and Workshops"},{"journal-title":"BotTorrent Misusing BT to Launch DDoS Attacks [Online]","year":"0","author":"defrawy","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil attack. peer-to-peer systems","volume":"2429","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2010.5569967"},{"key":"10","article-title":"DDoS vulnerability analysis of BT protocol","author":"sia","year":"2006","journal-title":"UCLA Tech Report"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1290168.1290176"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146894"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498344"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-010-0070-6"},{"key":"8","first-page":"42","article-title":"A survey of peer-to-peer security issues","author":"wallach","year":"2003","journal-title":"Proc 2002 Mext-NSF-JSPS Int Conf Software Security Theories and System"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06364105.pdf?arnumber=6364105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:35:27Z","timestamp":1498016127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6364105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6364105","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}