{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:38:01Z","timestamp":1774366681905,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/secpri.2004.1301320","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"130-143","source":"Crossref","is-referenced-by-count":209,"title":["SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks"],"prefix":"10.1109","author":[{"given":"A.","family":"Yaar","sequence":"first","affiliation":[]},{"given":"A.","family":"Perrig","sequence":"additional","affiliation":[]},{"given":"D.","family":"Song","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"117","article-title":"Efficient packet marking for largescale IP traceback","author":"goodrich","year":"2001","journal-title":"Proceedings of the 9th ACM conference on Computer and communications security"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"17","first-page":"608","article-title":"On denial of service in computer networks","author":"gligor","year":"1986","journal-title":"Proceedings of International Conference on Data Engineering"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.805028"},{"key":"18","article-title":"Guaranteeing access in spite of service-flooding attacks","author":"gligor","year":"2003","journal-title":"Proceedings of the Security Protocols Workshop"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/248157.248160"},{"key":"15","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","volume":"2267","author":"ferguson","year":"1998","journal-title":"RFC"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"13","article-title":"Analyzing ditributed denial of service attack tools: The Shaft case","author":"dietrich","year":"2000","journal-title":"14th Systems Administration Conference LISA 2000"},{"key":"14","author":"dittrich","year":"2003","journal-title":"Distributed Denial of Service (DDoS) attacks\/tools resource page"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"11","year":"2003","journal-title":"Increased Activity Targeting Windows Shares"},{"key":"38","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"song","year":"2001","journal-title":"Proceedings IEEE Infocomm 2001"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505588"},{"key":"21","author":"howard","year":"1998","journal-title":"An Analysis of Security Incidents on the Internet"},{"key":"20","article-title":"Analysis of an equal-cost multipath algorithm","volume":"2992","author":"hopps","year":"2000","journal-title":"Internet Request for Comments RFC 793"},{"key":"43","article-title":"IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks","author":"sung","year":"2002","journal-title":"Proc ICNP 2002"},{"key":"42","article-title":"CenterTrack: An IP overlay network for tracking DoS floods","author":"stone","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"},{"key":"41","first-page":"81","article-title":"Providing guaranteed services without per flow management","author":"stoica","year":"1999","journal-title":"Proc ACM SIGCOMM 99"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808414"},{"key":"45","article-title":"Over-zealous security administrators are breaking the Internet","author":"van den berg","year":"2002","journal-title":"Proceedings of 2002 LISA Conference"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781069"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"46","article-title":"Defending against denial-of-service attacks with puzzle auctions","author":"wang","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"22","article-title":"Implementing pushback: Router-based defense against DDoS attacks","author":"ioannidis","year":"2002","journal-title":"Proceedings of the 2004 Symposium on Network and Distributed Systems Security (NDSS"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863988"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/511483.511485"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"26","article-title":"On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack","author":"lee","year":"2001","journal-title":"Proceedings IEEE Infocomm 2001"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"28","article-title":"On design and evaluation of intention-driven ICMP traceback","author":"mankin","year":"2001","journal-title":"Proceedings of IEEE International Conference on Computer Communications and Networks"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"3","article-title":"The price of safety in an active network","author":"alexander","year":"1999","journal-title":"SIGCOMM 99"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509969"},{"key":"10","year":"1996","journal-title":"TCP SYN flooding and IP spoofing attacks"},{"key":"1","article-title":"Taming IP packet flooding attacks","author":"adkins","year":"2003","journal-title":"Proc Hot Topics in Networks (HotNets-II)"},{"key":"30","article-title":"Path MTU discovery","volume":"1191","author":"mogul","year":"1990","journal-title":"Internet Request for Comments RFC 793"},{"key":"7","article-title":"Requirements for Internet hosts communication layers","volume":"1122","author":"braden","year":"1989","journal-title":"Internet Request for Comments RFC 793"},{"key":"6","article-title":"The ICMP trace-back message","author":"bellovin","year":"2001","journal-title":"Internet draft"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383061"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972382"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"4","article-title":"Mayday: Distributed filtering for internet services","author":"andersen","year":"2003","journal-title":"Proceedings of USITS"},{"key":"9","year":"2000"},{"key":"8","author":"burch","year":"1999","journal-title":"Tracing Anonymous Packet to Their Approximate Source"}],"event":{"name":"IEEE Symposium on Security and Privacy, 2004. 2004","location":"Berkeley, CA, USA"},"container-title":["IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9120\/28916\/01301320.pdf?arnumber=1301320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:49:19Z","timestamp":1489427359000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1301320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/secpri.2004.1301320","relation":{},"subject":[]}}