{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:09:20Z","timestamp":1729616960118,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iwcmc.2016.7577112","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:01:42Z","timestamp":1475172102000},"page":"523-528","source":"Crossref","is-referenced-by-count":0,"title":["Commoditising DDoS mitigation"],"prefix":"10.1109","author":[{"given":"Alfredo","family":"Cardigliano","sequence":"first","affiliation":[]},{"given":"Luca","family":"Deri","sequence":"additional","affiliation":[]},{"given":"Tord","family":"Lundstrom","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Realtime High-Speed Network Traffic Monitoring Using ntopng","author":"deri","year":"2014","journal-title":"Proceedings of LISA"},{"key":"ref38","article-title":"Flow Statistics Based Detection of Low Rate and High Rate DDoS Attacks","volume":"4","author":"tewari","year":"2013","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.8.1206-1213"},{"journal-title":"SYN Cookies An Exploration","year":"0","author":"gordon","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref30","article-title":"Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks","author":"kuhrer","year":"2014","journal-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"ref36","article-title":"A Component-based Architecture for Open","author":"deri","year":"1997","journal-title":"Independently Extensible Distributed Systems"},{"journal-title":"Attack of the Shuriken 2015 Many Hands Many Weapons","year":"2015","author":"wilson","key":"ref35"},{"key":"ref34","article-title":"Understanding the Emerging Threat of DDoS-as-a-Service","author":"karami","year":"2013","journal-title":"USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.11.015"},{"journal-title":"Akamai's [state of the internet] \/ DrDoS Attacks","year":"2015","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"journal-title":"Towards Autonomic DDoS Mitigation using Software Defined Networking","year":"2015","author":"sahay","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211908"},{"key":"ref14","article-title":"On Measuring the Impact of DDoS Botnets","author":"santanna","year":"2014","journal-title":"Proceedings of the 7th European Workshop on Systems Security (EuroSec 2014)"},{"key":"ref15","first-page":"243","article-title":"Booters - An Analysis of DDoS-as-a-Service Attacks","year":"2015","journal-title":"Proc of the 14th IFIP\/IEEE Symposium on Integrated Network and Service Management (IM'15)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982297"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"journal-title":"ha ckers org Slowloris HTTP DoS","year":"2009","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890115"},{"key":"ref28","article-title":"High Speed Network Traffic Analysis with Commodity Multicore Systems","author":"deri","year":"2010","journal-title":"Proceedings of IMC 2010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20034-7_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110118"},{"journal-title":"Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router","year":"2009","author":"jin","key":"ref3"},{"key":"ref6","article-title":"Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks","author":"k\u00fchrer","year":"2014","journal-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2013.08.01"},{"key":"ref5","article-title":"Exit from Hell? Reducing the Impact of Amplification DDoS Attacks","author":"k\u00fchrer","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"journal-title":"DDoS-for-Hire Costs Just $38 per Hour InfoSec Magazine","year":"2015","author":"seals","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480517"},{"key":"ref9","article-title":"Cashing Out the Great Cannon? On Browser Based DDoS Attacks and Economics","author":"pellegrino","year":"2015","journal-title":"9th USENIX Workshop on Offensive Technologies (WOOT 15)"},{"journal-title":"Report of 2015 Q4","article-title":"Akamai's [state of the internet] \/ security","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"ref22","article-title":"Implementing Pushback: Router-Based Defense Against DDoS Attacks","author":"ioannidis","year":"2002","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407750"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.12.037"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"journal-title":"Reddit DDoS Solution Comparison","year":"2015","key":"ref26"},{"key":"ref25","article-title":"A Multi-classifiers Based Novel DoS\/DDoS Attack Detection Using Fuzzy Logic","volume":"2","author":"patel","year":"2015","journal-title":"Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015"}],"event":{"name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2016,9,5]]},"location":"Paphos, Cyprus","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7571053\/7577016\/07577112.pdf?arnumber=7577112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:44:11Z","timestamp":1476225851000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2016.7577112","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}