{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:19:34Z","timestamp":1776284374190,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472027","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Defending Against Distributed Denial of Service (DDoS) Attacks: A Case Study of CrowdStrike\u2019s Role in Modern Cyber Warfare"],"prefix":"10.1109","author":[{"given":"Tarik","family":"Eltaeib","sequence":"first","affiliation":[{"name":"Farmingdale State College,Computer Security,USA"}]},{"given":"McCloud","family":"Robert","sequence":"additional","affiliation":[{"name":"Sacredheart University,Computer Science,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"How Red Canary works with Crowdstrike Falcon"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref3","article-title":"Penetration testing and network defense","author":"Whitaker","year":"2006","journal-title":"Pearson Education"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103096"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/ijswis.297143"},{"key":"ref6","article-title":"What Really Happened? CrowdStrike Investigation Reveals Cause of Global IT Crash","author":"Crash"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.34118\/jskp.v4i01.3866"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100631"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100450"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78440-3_13"},{"key":"ref11","article-title":"Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak","author":"Larsson","year":"2023","journal-title":"ed"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICADEIS56544.2022.10037384"},{"key":"ref13","article-title":"George Kurtz CEO\/Co-founder, CrowdStrike","author":"Sachs","year":"2024","journal-title":"ed"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361416"},{"key":"ref15","article-title":"Cloud Security Posture Management\/CSPM) in Azure","author":"Enriquez","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.30574\/ijsra.2023.8.1.0023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1767484"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02945-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.53477\/2284-9378-24-10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.29202\/fhi\/19\/5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2023.05.184"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-024-00394-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110132"},{"key":"ref24","article-title":"Resilience to DDoS attacks","author":"Ye","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3472811"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1201\/9781003145721-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92300-6_7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.01.013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561458"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.101984"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09071-1"},{"issue":"3","key":"ref32","first-page":"22","article-title":"An Overview of Malware Injection Attacks: Techniques, Impacts, and Countermeasures","volume":"6","author":"Madhvan","year":"2023","journal-title":"Borneo International Journal"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.282"},{"key":"ref34","article-title":"Use of Fancy Bear Android Malware in Tracking of Ukraini An Field Artiller Y Units","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1353\/asp.2020.0014"},{"key":"ref36","volume-title":"Russian Information Warfare : Assault on Democracies in the Cyber Wild West","author":"Lilly","year":"2022"},{"key":"ref37","volume-title":"Coding the Boundaries of Conflict","author":"Jasper"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/14650045.2022.2129012"},{"key":"ref39","first-page":"4419-4443","article-title":"State-of-the-Art in Chinese APT Attack and Using Threat Intelligence for Detection. A Survey","author":"Mohamed","year":"2022","journal-title":"Journal of Positive School Psychology"},{"issue":"1","key":"ref40","first-page":"49","article-title":"Russian Cyber Campaigns in Support of Military Operations","volume":"37","author":"Arthur","year":"2020","journal-title":"American Intelligence Journal"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54602-1_5"},{"issue":"4","key":"ref42","first-page":"55","article-title":"\u0414\u043e\u0433\u043e\u0441\u043f\u0438\u0442\u0430\u043b\u044c\u043d\u0430\u044f \u043f\u043e\u043c\u043e\u0449\u044c \u043f\u043e \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u0430\u043c Damage Control Resuscitation \u0432 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0431\u043e\u0435\u0432\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 (\u043e\u0431\u0437\u043e\u0440 \u043b\u0438\u0442\u0435\u0440\u0430\u0442\u0443\u0440\u044b)","author":"\u0428\u0430\u043f\u043a\u0438\u043d","year":"2023","journal-title":"\u041c\u0435\u0434\u0438\u043a\u043e-\u0431\u0438\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0438 \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u043e-\u043f\u0441\u0438\u0445\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0447\u0440\u0435\u0437\u0432\u044b\u0447\u0430\u0439\u043d\u044b\u0445 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f\u0445"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17816\/rmmar75865"},{"key":"ref44","article-title":"Russian National Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data"},{"key":"ref45","article-title":"Russian hacking proves lethal after Ukrainian military app hijacked","author":"Martin"},{"key":"ref46","article-title":"X-Agent","author":"Cell"},{"key":"ref47","article-title":"Russians Used Cyber Bots to Target Ukrainian Artillery","author":"Update"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472027.pdf?arnumber=11472027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:24:47Z","timestamp":1776281087000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472027","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}