{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:13:37Z","timestamp":1725405217386},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/noms.2018.8406312","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:09:23Z","timestamp":1531177763000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["DAMUP: Practical and privacy-aware cloud-based DDoS mitigation"],"prefix":"10.1109","author":[{"given":"Su-Chin","family":"Lin","sequence":"first","affiliation":[]},{"given":"Po-Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hsin-Yi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hsu-Chun","family":"Hsiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978301"},{"key":"ref11","article-title":"Phalanx: Withstanding Multimillion-Node Botnets","author":"colin dixon","year":"2008","journal-title":"USENIX NSDI"},{"key":"ref12","article-title":"The security impact of https interception","author":"durumeric","year":"2017","journal-title":"NDSS"},{"key":"ref13","article-title":"Cdn-on-demand: An affordable ddos defense via untrusted clouds","author":"gilad","year":"2016","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851214"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978306"},{"journal-title":"Mirage Towards Deployable Ddos Defense for Web Applications","year":"2011","author":"mittal","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"ref18","article-title":"Maneu-vering Around Clouds: Bypassing Cloud-based Security Providers","author":"vissers","year":"2015","journal-title":"ACM CCS"},{"key":"ref19","article-title":"A DoS-limiting Network Architecture","author":"xiaowei yang","year":"2005","journal-title":"ACM SIGCOMM CCR"},{"journal-title":"HatCloud-Bypass CloudFlare with Ruby","year":"0","key":"ref4"},{"journal-title":"DDoS Attacks Size","year":"0","key":"ref3"},{"journal-title":"Overview of Keyless SSL","year":"0","key":"ref6"},{"journal-title":"Looking forward to 2018","year":"0","key":"ref5"},{"journal-title":"The Average DDoS Attack Cost for Businesses Rises to Over 2 5m","year":"0","key":"ref8"},{"journal-title":"Radware's ssl-tls attack mitigation solution","year":"0","key":"ref7"},{"journal-title":"Cloudbleed bug Everything you need to know","year":"0","key":"ref2"},{"journal-title":"Application-layer DDoS Attacks The Numbers May Surprise You","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3546"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"}],"event":{"name":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2018,4,23]]},"location":"Taipei","end":{"date-parts":[[2018,4,27]]}},"container-title":["NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399136\/8406102\/08406312.pdf?arnumber=8406312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:18:04Z","timestamp":1643210284000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/noms.2018.8406312","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}