{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:55:08Z","timestamp":1725731708970},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413679","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:26:08Z","timestamp":1456485968000},"page":"3-10","source":"Crossref","is-referenced-by-count":2,"title":["Using inherent command and control vulnerabilities to halt DDoS attacks"],"prefix":"10.1109","author":[{"given":"Lanier","family":"Watkins","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Silberberg","sequence":"additional","affiliation":[]},{"given":"Jose Andre","family":"Morales","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_12"},{"key":"ref33","article-title":"Cyber Strategy Relies on Deterrence, Industry","author":"mehta","year":"2015","journal-title":"Defense News Online"},{"key":"ref32","article-title":"Hacker Group &#x2018;Lizard Squad&#x2019; Hits Xbox Live and PlayStation Netwok with DDoS Attacks","author":"bisson","year":"2014","journal-title":"Tripwire State of Security Blog"},{"key":"ref31","article-title":"How hospitals can fight back against new hacker attacks","author":"white","year":"2014","journal-title":"HealthCare Business&Technology Online"},{"key":"ref30","article-title":"Bitrnain Fights Back Against DDoS Group","author":"johnson","year":"2015","journal-title":"Coin Fire Online News"},{"journal-title":"Pandora Toolkit Builder Hash 71 b55t731898e7a4071b4e1825dlc312 and Executable Hash 10640ef9fde79dE019aflf2d2c5b404bf","year":"0","key":"ref37"},{"journal-title":"Akamai Website","year":"0","key":"ref36"},{"key":"ref35","article-title":"DDoS Botnet Now Can Detect Denial-Of-Service Defenses","author":"higgins","year":"2013","journal-title":"Information Week Dark Reading Online"},{"key":"ref34","article-title":"Cyber Deterrence Is a Strategic Imperative","author":"cilluffo","year":"2015","journal-title":"The Wall Street Journal Online"},{"article-title":"Founder of Stealthy Security Firm Endgame To Lawmaxers: Let U.S. Companies &#x2018;Hack Back&#x2019;, Forbes Online","year":"2013","author":"greenberg","key":"ref10"},{"journal-title":"Dirt Jumper 5 Toolkit Builder Hash 6758c4bd4c2347bd81439b7f47f19050 and Executable Hash 506ba7a322288cc4dc55b7c32fea9f4f","year":"0","key":"ref40"},{"key":"ref11","article-title":"DirtJumper Drive Shifts into a New Gear","author":"jones","year":"2013","journal-title":"Arbor Networks Security Blog"},{"journal-title":"Prolexic (Akamai) Website","year":"0","key":"ref12"},{"journal-title":"Prolexic (Akamai) Website","year":"0","key":"ref13"},{"journal-title":"Radware Website","year":"0","key":"ref14"},{"key":"ref15","article-title":"Hacking back - tempting, but is it legal?","author":"pearce","year":"2014","journal-title":"Computing Online"},{"key":"ref16","article-title":"FBI Probes If Banks Hacked Back as Firms Mull Offensives","author":"riley","year":"2014","journal-title":"Bloomberg Business Online"},{"key":"ref17","article-title":"Would the U.S. Really Crack Down on Companies That Hack Back?","author":"robertson","year":"2014","journal-title":"Bloomberg Business Online"},{"key":"ref18","article-title":"Tracking DDoS Attacks: Insights into the Business of Disrupting the Web","author":"b\u00fcscher","year":"2012","journal-title":"the Proceedings of the USENIX conference on Large-Scale Exploits and Emergent Threats"},{"key":"ref19","article-title":"Insights from the Inside: A View of Botnet Management from Infiltration","author":"cho","year":"2010","journal-title":"Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats (LEET)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999411"},{"key":"ref28","article-title":"BladeRunner: Adventures in Tracking Botnets","author":"eisenbarth","year":"2013","journal-title":"the Proceedings of the Botnet Fighting Conference (Botconf)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714637"},{"journal-title":"SQLMap Website","year":"0","key":"ref27"},{"journal-title":"The Department of Justice Computer Fraud and Abuse Act Website","year":"0","key":"ref6"},{"journal-title":"IP Commission Website","year":"0","key":"ref5"},{"key":"ref29","article-title":"DirtJumper's DDoS Engine Gets a Tune-Up with new &#x2018;Drive&#x2019; Variant","author":"jones","year":"2013","journal-title":"Arbor Networks Security Blog"},{"journal-title":"NORSE Corporation Website","year":"0","key":"ref8"},{"journal-title":"ESSA Website","year":"0","key":"ref7"},{"journal-title":"State of the Internet Website","year":"0","key":"ref2"},{"journal-title":"Prolexic (Akamai) Website","year":"0","key":"ref9"},{"journal-title":"Prolexic (Akamai) Website","year":"0","key":"ref1"},{"journal-title":"Leak Forums Website","year":"0","key":"ref20"},{"journal-title":"Dell SecureWorks Website","year":"0","key":"ref22"},{"journal-title":"Prolexic (Akamai) Website","year":"0","key":"ref21"},{"journal-title":"Wireshark Website","year":"0","key":"ref24"},{"journal-title":"HackForums Website","year":"0","key":"ref23"},{"key":"ref26","article-title":"White hats publish DDoS hijacking manual, turn tables on attackers","author":"goodin","year":"2012","journal-title":"Arstechnica Online"},{"journal-title":"InetSim Website","year":"0","key":"ref25"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2015,10,20]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413679.pdf?arnumber=7413679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:34:03Z","timestamp":1490096043000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7413679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413679","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}