{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:06:43Z","timestamp":1773324403582,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/ispan.2004.1300541","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"581-586","source":"Crossref","is-referenced-by-count":24,"title":["IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks"],"prefix":"10.1109","author":[{"given":"E.Y.K.","family":"Chan","sequence":"first","affiliation":[]},{"given":"H.W.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"K.M.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"V.P.S.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"S.T.","family":"Chanson","sequence":"additional","affiliation":[]},{"given":"M.M.H.","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"C.F.","family":"Chong","sequence":"additional","affiliation":[]},{"given":"K.P.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"A.K.T.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"L.C.K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"L.C.K.","family":"Lam","sequence":"additional","affiliation":[]},{"given":"W.C.","family":"Lau","sequence":"additional","affiliation":[]},{"given":"K.K.H.","family":"Pun","sequence":"additional","affiliation":[]},{"given":"A.Y.F.","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"W.W.","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"S.C.W.","family":"Tso","sequence":"additional","affiliation":[]},{"family":"Dit-Yan Yeung","sequence":"additional","affiliation":[]},{"given":"K.Y.","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Detecting syn flooding attacks","author":"wang","year":"2002","journal-title":"Proceedings IEEE INFOCOM 2002 the 21st Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"17","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/347059.347560","article-title":"Practical network support for ip traceback","author":"savage","year":"2000","journal-title":"Proceedings of the ACM SIGCOMM 2000 Conference on Applications Technologies Architectures and Protocols for Computer Communication"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"15","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1109\/INFCOM.2001.916716","article-title":"On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack","volume":"1","author":"park","year":"2001","journal-title":"Proceedings IEEE INFOCOM 2001 the Conference on Computer Communications Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies Twenty Years into the Communications Odyssey"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/514216.514219"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2002.1181787"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/358161.358167"},{"key":"11","article-title":"Packetscore: Statistical-based overload control against deistributed denial-of-service attacks","author":"kim","year":"2004","journal-title":"Proceedings IEEE INFOCOM 2004 the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/948224.948226"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"2","author":"barlow","year":"2000","journal-title":"Tfn2k - An Analysis Information Security Bulletin"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277897"},{"key":"10","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/358628.358632"},{"key":"6","year":"2003"},{"key":"5","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/316188.316229","article-title":"On power-law relationships of the internet topology","author":"faloutsos","year":"1999","journal-title":"Proceedings of the Conference on Applications Technologies Architectures and Protocols for Computer Communication"},{"key":"4","article-title":"Ddos attack detection and defense using routers","author":"chan","year":"0","journal-title":"Proc 13th USENIX Security Symp (Security '04)"},{"key":"9","year":"0"},{"key":"8","author":"houle","year":"2001","journal-title":"Trends in Denial of Service Attack Technology"}],"event":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","location":"Hong Kong, China","start":{"date-parts":[[2004,5,12]]},"end":{"date-parts":[[2004,5,12]]}},"container-title":["7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9103\/28881\/01300541.pdf?arnumber=1300541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T05:47:30Z","timestamp":1624427250000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1300541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ispan.2004.1300541","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}