{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:16:06Z","timestamp":1729653366189,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iwcmc.2016.7577110","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:01:42Z","timestamp":1475172102000},"page":"510-515","source":"Crossref","is-referenced-by-count":2,"title":["Reproducing DNS 10Gbps flooding attacks with commodity-hardware"],"prefix":"10.1109","author":[{"given":"Santiago Ruano","family":"Rincon","sequence":"first","affiliation":[]},{"given":"Sandrine","family":"Vaton","sequence":"additional","affiliation":[]},{"given":"Stephane","family":"Bortzmeyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"AFNI","article-title":"DNSWitness","year":"0","key":"ref10"},{"key":"ref11","article-title":"DNS Response Rate Limiting - ISC-TN-2012-1-Draft1","author":"vixie","year":"2012","journal-title":"ISC 2 Tech Rep"},{"key":"ref12","article-title":"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing","author":"ferguson","year":"2000","journal-title":"IETF Tech Rep"},{"key":"ref13","article-title":"Preventing Use of Recursive Nameservers in Reflector Attacks","author":"damas","year":"2008","journal-title":"IETF"},{"article-title":"Harnessing low-level tuning in modern architectures for high-performance network monitoring in physical and virtual platforms","year":"2015","author":"moreno","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110118"},{"journal-title":"DPDK","article-title":"Data Plane Development Kit","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2424887"},{"key":"ref18","first-page":"64","article-title":"On Multigigabit Packet Capturing with Multi-core Commodity Hardware","volume":"7192","author":"bonelli","year":"2012","journal-title":"Proc of PAM 2012"},{"journal-title":"PF_RING","article-title":"High-speed packet capture, filtering and analysis","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"article-title":"State of Danger - talk at AusNog","year":"0","author":"dobbins","key":"ref3"},{"journal-title":"RIPE-NCC","article-title":"DNS Monitoring Service (DNSMON)","year":"0","key":"ref6"},{"article-title":"Disturbance in the DNS - talk at DNS-OARC","year":"0","author":"balakrichenan","key":"ref5"},{"key":"ref8","article-title":"Extension Mechanisms for DNS(EDNS(0))","author":"damas","year":"2013","journal-title":"IETF"},{"article-title":"Review and analysis of attack traffic against A-root and J-root on November 30 and December 1, 2015 - talk at DNS-OARC","year":"2015","author":"weinberg","key":"ref7"},{"key":"ref2","article-title":"Pers&#x00E9;e et la Gorgone: attaques par d&#x00E9;ni de service utilisant le DNS, et les contre- mesures","author":"bortzmeyer","year":"2013","journal-title":"Les Journ&#x00E9;es R&#x00E9;seaux (JRES)"},{"journal-title":"Agence Nationale de la S&#x00E9;curit&#x00E9; des Syst&#x00E8;mes d'Information Tech Rep","article-title":"Rapport 2014 sur la r&#x00E9;silience de l'Internet fran&#x00E7;ais","year":"2014","key":"ref1"},{"year":"0","key":"ref9","article-title":"Nagios"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28534-9_17"},{"year":"0","key":"ref22","article-title":"DPDK-Accelerated Ostinato prototype"},{"article-title":"Pktgen","year":"0","author":"systems","key":"ref21"},{"article-title":"Snabb Switch","year":"0","author":"gorrie","key":"ref24"},{"journal-title":"LuaJIT","article-title":"Lua Just in Time Compiler","year":"0","key":"ref23"}],"event":{"name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2016,9,5]]},"location":"Paphos, Cyprus","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7571053\/7577016\/07577110.pdf?arnumber=7577110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:56:26Z","timestamp":1476226586000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2016.7577110","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}