{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T23:48:45Z","timestamp":1774655325449,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472153"],"award-info":[{"award-number":["62472153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2025JJ50350"],"award-info":[{"award-number":["2025JJ50350"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tc.2025.3625385","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:52:33Z","timestamp":1762455153000},"page":"247-260","source":"Crossref","is-referenced-by-count":7,"title":["DNSGreen: A Comprehensive Defense System Against Bounce-Style DNS DDoS Attacks With P4"],"prefix":"10.1109","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0062-0213","authenticated-orcid":false,"given":"Dan","family":"Tang","sequence":"first","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7435-5367","authenticated-orcid":false,"given":"Xiaocai","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1165-1170","authenticated-orcid":false,"given":"Pei","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, State University of New York, New Paltz, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8712-2964","authenticated-orcid":false,"given":"Jiliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Integrated Circuit Science and Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107883"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102095"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.78"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3183390"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.177"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3704434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2025.3541143"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"ref9","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Liu","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3011798"},{"key":"ref11","first-page":"19","article-title":"Offloading real-time DDoS attack detection to programmable data planes","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Lapolli","year":"2019"},{"key":"ref12","first-page":"3865","article-title":"Ripple: A programmable, decentralized link-flooding defense against adaptive adversaries","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Xing","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3687230.3687232"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507726"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365864"},{"key":"ref17","first-page":"352","article-title":"Line-speed and scalable intrusion detection at the network edge via federated learning","volume-title":"Proc. IFIP Netw. Conf. (Netw.)","author":"Qin","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405865"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6814019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297272"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624805"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126053"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3275768"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.011"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3522104"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3355786"},{"key":"ref27","article-title":"\u201cRobust peak detection algorithm using z-scores,\u201d","volume-title":"Stack Overflow.","author":"van Brakel"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3563647.3563654"},{"key":"ref29","first-page":"263","article-title":"Traffic data repository at the WIDE project","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Cho","year":"2000"},{"key":"ref30","article-title":"10 days DNS network traffic from 2016","author":"Singh","year":"2019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech52372.2021.00024"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483357"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901896"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2022.23012"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472854"},{"key":"ref39","article-title":"Programmable in-network obfuscation of DNS traffic","author":"Wang","year":"2021","journal-title":"NDSS: DNS Privacy Workshop"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103718"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3691404"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.25.854"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897877"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.12.019"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/12\/11296746\/11230647.pdf?arnumber=11230647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T12:31:07Z","timestamp":1766061067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11230647\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":44,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tc.2025.3625385","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}