{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:48:18Z","timestamp":1742402898590},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2005.1523866","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:51:59Z","timestamp":1160581919000},"page":"275-280","source":"Crossref","is-referenced-by-count":5,"title":["Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources"],"prefix":"10.1109","author":[{"family":"Ruiliang Chen","sequence":"first","affiliation":[]},{"family":"Jung-Min Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Denying denial of service attacks: A router based solution","author":"zhang","year":"2003","journal-title":"The 2003 International Conference on Internet Computing"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233709"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194869"},{"journal-title":"CAIDA's Skitter Project Web Page","year":"0","key":"11"},{"key":"12","first-page":"199","article-title":"CenterTrack: An IP overlay network for tracking DoS floods","author":"stone","year":"2000","journal-title":"The 2000 USENIX Security Symposium"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2267"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2004.1401609"},{"key":"10","first-page":"295","article-title":"Practical network support for IP traceback","author":"savage","year":"2000","journal-title":"The Conference on Applications Technologies Architectures and Protocols for Computer Communication (SIGCOMM)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"journal-title":"Computer Networking A Top-Down Approach Featuring the Internet Third Edition","year":"2004","author":"kurose","key":"5"},{"key":"4","first-page":"30","article-title":"Hop-count filtering: An effective defense against spoofed DoS traffic","author":"jin","year":"2003","journal-title":"The Tenth ACM International Conference on Computer and Communications Security (CCS)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194868"},{"journal-title":"Distributed Denial of Service Incident Handling Real-time Inter-network Defense","year":"2004","author":"moriarty","key":"8"}],"event":{"name":"14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","location":"San Diego, CA, USA"},"container-title":["Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10216\/32582\/01523866.pdf?arnumber=1523866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T02:19:19Z","timestamp":1489544359000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icccn.2005.1523866","relation":{},"subject":[]}}