{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:25:04Z","timestamp":1725409504692},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,17]]},"DOI":"10.1109\/svcc61185.2024.10637305","type":"proceedings-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:53:34Z","timestamp":1724349214000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Distributed Approach for Detecting and Mitigating DDoS Attacks on White-Boxes"],"prefix":"10.1109","author":[{"given":"Pablo Armingol","family":"Robles","sequence":"first","affiliation":[{"name":"Telef&#x00F3;nica Innovacion Digital,Madrid,Spain"}]},{"given":"Antonio Agust\u00edn Pastor","family":"Perales","sequence":"additional","affiliation":[{"name":"Telef&#x00F3;nica Innovacion Digital,Madrid,Spain"}]},{"given":"Juan Carlos Caja","family":"D\u00edaz","sequence":"additional","affiliation":[{"name":"Telef&#x00F3;nica Innovacion Digital,Madrid,Spain"}]}],"member":"263","reference":[{"year":"2023","journal-title":"2022 in review: DDoS attack trends and insights","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s11235-019-00599-z"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACCESS.2018.2831284"},{"volume-title":"Cloud DDoS Services","key":"ref4"},{"volume-title":"DDoS Protection Services","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICC.2019.8761580"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/WAINA.2013.94"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/GLOCOM.2017.8254023"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10922-020-09539-8"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/nuicone.2012.6493216"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1002\/cpe.5402"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s13369-017-2414-5"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.11591\/ijeecs.v19.i1.pp505-512"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/COMPSAC.2015.240"},{"volume-title":"DDoS Mitigation Solutions Reviews and Ratings","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/jlt.2018.2815266"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1002\/wics.1511"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/gcce46687.2019.9015442"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/mic.2010.29"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/UPCON.2017.8251130"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s12652-021-02907-5"},{"volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"K\u00fchrer","article-title":"Hell of a handshake: abusing TCP for reflective amplification DDoS attacks","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.ins.2023.01.067"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/icc.2019.8761580"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TSMCC.2004.843247"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.5120\/20639-3318"},{"volume-title":"Linux Ping Command Tutorial with Examples","key":"ref27"},{"volume-title":"IXIA BreakingPoint","key":"ref28"}],"event":{"name":"2024 Silicon Valley Cybersecurity Conference (SVCC)","start":{"date-parts":[[2024,6,17]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,6,19]]}},"container-title":["2024 Silicon Valley Cybersecurity Conference (SVCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10637325\/10637304\/10637305.pdf?arnumber=10637305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:15:30Z","timestamp":1725340530000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,17]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/svcc61185.2024.10637305","relation":{},"subject":[],"published":{"date-parts":[[2024,6,17]]}}}