{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:51:24Z","timestamp":1725699084347},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/icccn.2014.6911784","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:26:58Z","timestamp":1412094418000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Performing software defined route-based IP spoofing filtering with SEFA"],"prefix":"10.1109","author":[{"given":"Guang","family":"Yao","sequence":"first","affiliation":[]},{"given":"Jun","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Peiyao","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Duanqi","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Practical IP Spoofing Defense Through Route-Based Filtering","year":"0","author":"mirkovic","key":"19"},{"journal-title":"Onix A distributed control platform for large-scale production networks","year":"0","author":"koponen","key":"22"},{"key":"17","first-page":"7","author":"yao","year":"0","journal-title":"Source Address Validation Solution with OpenFlow\/NOX Architecture"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3704"},{"key":"18","first-page":"408","author":"braga","year":"0","journal-title":"Lightweight DDoS Flooding Attack Detection Using NOX\/OpenFlow"},{"key":"15","first-page":"1","author":"casado","year":"0","journal-title":"Ethane Taking Control of the Enterprise"},{"key":"16","first-page":"11","author":"nayak","year":"0","journal-title":"Resonance Dynamic Access Control for Enterprise Networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2406"},{"key":"11","first-page":"365","article-title":"Passport: Secure and adoptable source authentication","author":"liu","year":"2008","journal-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation San Francisco California"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497921"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.08.018"},{"journal-title":"Smurf IP Denial-of-Service Attacks","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.128"},{"journal-title":"TCP SYN flooding and IP spoofing attacks","year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.128"},{"journal-title":"Bots DDoS and Ground Truth","year":"0","author":"labovitz","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"journal-title":"SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks","year":"2006","key":"5"},{"journal-title":"DNS amplification attacks","year":"0","author":"vaughn","key":"4"},{"key":"9","first-page":"1557","article-title":"SAVE: Source address validity enforcement protocol","author":"li","year":"2002","journal-title":"Ieee Infocom 2002 The Conference on Computer Communications Vols 1-3 Proceedings"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383061"}],"event":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2014,8,4]]},"location":"China","end":{"date-parts":[[2014,8,7]]}},"container-title":["2014 23rd International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6901364\/6911704\/06911784.pdf?arnumber=6911784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:47:51Z","timestamp":1490291271000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccn.2014.6911784","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}