{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:42:54Z","timestamp":1773322974608,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2003,2,1]],"date-time":"2003-02-01T00:00:00Z","timestamp":1044057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2003,2]]},"DOI":"10.1109\/tc.2003.1176986","type":"journal-article","created":{"date-parts":[[2003,3,7]],"date-time":"2003-03-07T18:58:16Z","timestamp":1047063496000},"page":"195-208","source":"Crossref","is-referenced-by-count":91,"title":["Sustaining availability of web services under distributed denial of service attacks"],"prefix":"10.1109","volume":"52","author":[{"family":"Jun Xu","sequence":"first","affiliation":[]},{"family":"Wooyong Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","year":"2001","journal-title":"Ucb Network Simulator\u2014ns (version 2)"},{"key":"ref2","article-title":"The Economic Impacts of Unacceptable Web Site Download Speeds","year":"1999"},{"key":"ref3","year":"2001","journal-title":"Distributed Denial of Service Attack Tools"},{"key":"ref4","article-title":"Internet Draft: Icmp Traceback Messages","author":"Bellovin","year":"2000"},{"key":"ref5","article-title":"Tracing Anonymous Packets to Their Approximate Source","volume-title":"Proc. Usenix LISA 2000","author":"Burch"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2000.832203"},{"key":"ref7","article-title":"TCP Syn Flooding and IP Spoofing Attacks","year":"1996","journal-title":"Advisory CA-96.21"},{"key":"ref8","volume-title":"ATM Switching Systems","author":"Chen","year":"1995"},{"key":"ref9","article-title":"A Behavior Model of a Web Traffic","volume-title":"Proc. Int\u2019l Conf. Network Protocols (ICNP \u201999)","author":"Choi"},{"key":"ref10","first-page":"3","article-title":"An Algebraic Approach to IP Traceback","volume-title":"Proc. Network and Distributed System Security Symp. (NDSS 2001)","author":"Dean"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352627"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1995.390639"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21236\/ADA401819"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/90.649564"},{"key":"ref16","article-title":"An Analysis of Security Incidents on the Internet","volume-title":"Carnegie Mellon Univ.","author":"Howard","year":"1998"},{"key":"ref17","year":"1999","journal-title":"Photuris: Session-Key Management Protocol"},{"key":"ref18","article-title":"TCP Syn Flooding Attack and the Firewall-1 Syndefender","year":"1997"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2004.840210"},{"key":"ref20","volume-title":"Game Theory: Mathematical Models of Conflict","author":"Jones","year":"1980"},{"key":"ref21","article-title":"Client Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks","volume-title":"Proc. Network and Distributed System Security Symp. (NDSS \u201999)","author":"Juels"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372148"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2401"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.644510"},{"key":"ref25","article-title":"Controlling High Bandwidth Aggregates in the Network","author":"Mahajan","year":"2001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779758"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"issue":"1-2","key":"ref28","article-title":"Improving http Latency","volume-title":"Computer Networks and ISDN Systems","volume":"28","author":"Padmanabhan","year":"1995"},{"key":"ref29","article-title":"On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack","volume-title":"Proc. IEEE Infocom 2001","author":"Park"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383061"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/90.700888"},{"key":"ref32","article-title":"Rfc 793: Transmission Control Protocol","author":"Postel","year":"1980"},{"key":"ref33","first-page":"38","article-title":"The Omega Key Management Service","volume-title":"Proc. ACM Conf. Computer and Comm. Security","author":"Reiter"},{"key":"ref34","article-title":"Defending Networks from Syn Flooding in Depth","author":"Rice","year":"2000"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref37","first-page":"231","article-title":"Efficient Fair Queuing Using Deficit Round Robin","volume-title":"Proc. ACM SIGCOMM \u201995","author":"Shreedhar"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383060"},{"key":"ref39","article-title":"Advanced and Authenticated Marking Schemes for IP Traceback","volume-title":"Proc. Infocom 2001","author":"Song"},{"key":"ref40","first-page":"59","article-title":"Defending against Denial of Service Attacks in Scout","volume-title":"Proc. 1999 USENIX\/ACM Symp. Operating System Design and Implementation","author":"Spatcheck"},{"key":"ref41","volume-title":"TCP\/IP Illustrated Volume 1, The Protocols","author":"Stevens","year":"1994"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.659666"},{"key":"ref43","article-title":"Sustaining Availability of Web Services under Severe Denial of Service Attacks","author":"Xu","year":"2001"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/65.238150"},{"key":"ref45","article-title":"Coca: A Secure Distributed On-Line Certification Authority","author":"Zhou","year":"2000"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/12\/26428\/01176986.pdf?arnumber=1176986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:00:33Z","timestamp":1742097633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,2]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,2]]}},"URL":"https:\/\/doi.org\/10.1109\/tc.2003.1176986","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2003,2]]}}}