{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T06:52:41Z","timestamp":1772347961609,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/sncc.2014.6866508","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:18:09Z","timestamp":1406755089000},"page":"1-5","source":"Crossref","is-referenced-by-count":19,"title":["Distributed Denial of service attacks and its effects on Cloud environment- a survey"],"prefix":"10.1109","author":[{"given":"B.","family":"Prabadevi","sequence":"first","affiliation":[]},{"given":"N.","family":"Jeyanthi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.89"},{"key":"22","first-page":"163","article-title":"Packet resonance strategy: A spoof attack detection and prevention mechanism in cloud computing environment","volume":"4","author":"jeyanthi","year":"2012","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"17","first-page":"56","article-title":"Cloud security: Attacks and current defenses","author":"booth","year":"2013","journal-title":"The 8th Annual Symposium on Information Assurance (ASIA'13)"},{"key":"18","first-page":"163","article-title":"An enhanced entropy approach to detect and prevent DDoS in cloud environment","volume":"5","author":"jeyanthi","year":"2013","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"15","article-title":"A practical method to counteract denial of service attacks","volume":"16","author":"tupakula","year":"2003","journal-title":"Twenty-Fifth Australasian Computer Science Conference"},{"key":"16","first-page":"204","article-title":"A feeedback mechanism for mitigating Denial of Service attacks against differentiated services clients","author":"geoffrey","year":"2002","journal-title":"The 10th International Conference on Telecommunications Systems"},{"key":"13","article-title":"A survey of DDoS attacks and some DDoS defense mechanisms","author":"zaroo","year":"2003","journal-title":"Advanced Information Assurance (CS 626)"},{"key":"14","first-page":"319","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc Usenix LISA (New Orleans) Conf"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.21236\/ADA401819","author":"gil","year":"2001","journal-title":"MULTOPS A Data-Structure for bandwidth attack detection"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0451118"},{"key":"3","article-title":"Cloud QoS, high availability and service security issues with solutions","author":"zakarya","year":"2012","journal-title":"IJCSNS"},{"key":"20","first-page":"729","article-title":"Intrusion detection in cloud","author":"roschke","year":"0","journal-title":"8th IEEE International Conference on Dependable Automatic and Secure Computing"},{"key":"2","article-title":"Defenses against distributed denial of service attacks","author":"kessler","year":"2000","journal-title":"Computer Security Handbook 2nd Edition"},{"key":"1","article-title":"A dual mechanism for defeating DDoS attacks in cloud computing model","volume":"2","author":"goyal","year":"2013","journal-title":"International Journal of Application or Innovation in Engineering and Management"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/6294.869381"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"6","first-page":"543","article-title":"Distributed denial of service: Taxonomies of attacks, tools, and countermeasures","author":"specht","year":"2004","journal-title":"Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems 2004 International Workshop on Security in Parallel and Distributed Systems"},{"key":"5","author":"mell","year":"2011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5120\/7292-0578"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"8","year":"0"}],"event":{"name":"2014 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Hammamet, Tunisia","start":{"date-parts":[[2014,6,17]]},"end":{"date-parts":[[2014,6,19]]}},"container-title":["The 2014 International Symposium on Networks, Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6861313\/6866503\/06866508.pdf?arnumber=6866508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T11:06:22Z","timestamp":1565694382000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/sncc.2014.6866508","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}