{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:11Z","timestamp":1740133271754,"version":"3.37.3"},"reference-count":98,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2901305"],"award-info":[{"award-number":["2022YFB2901305"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u201cPioneer\u201d and \u201cLeading Goose\u201d Research and Development Program of Zhejiang Province","award":["2022C01085"],"award-info":[{"award-number":["2022C01085"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902362","62172007"],"award-info":[{"award-number":["61902362","62172007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Zhejiang","award":["2020C01038"],"award-info":[{"award-number":["2020C01038"]}]},{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20179"],"award-info":[{"award-number":["U20A20179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Science and Technology Infrastructure Project of Zhijiang Laboratory"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tnet.2023.3281449","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:45:18Z","timestamp":1686159918000},"page":"191-206","source":"Crossref","is-referenced-by-count":3,"title":["Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0249-9664","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Hongyan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6379-0244","authenticated-orcid":false,"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Big Data, Fuzhou University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8008-2805","authenticated-orcid":false,"given":"Haifeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7958-9687","authenticated-orcid":false,"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7966-4488","authenticated-orcid":false,"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China"}]}],"member":"263","reference":[{"volume-title":"DDoS Statistics","year":"2023","key":"ref1"},{"key":"ref2","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","volume-title":"Proc. USENIX Secur.","author":"Fayaz"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"ref5","first-page":"1","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","volume-title":"Proc. USENIX Secur.","author":"Liu"},{"key":"ref6","first-page":"1","article-title":"Ripple: A programmable, decentralized link-flooding defense against adaptive adversaries","volume-title":"Proc. USENIX Secur.","author":"Xing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1111"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00032"},{"volume-title":"iPerf","year":"2023","key":"ref10"},{"volume-title":"Tcpreplay","year":"2023","key":"ref11"},{"volume-title":"PYLOT","year":"2023","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274717"},{"volume-title":"IXIA","year":"2023","key":"ref14"},{"volume-title":"Spirent Testcenter","year":"2023","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"volume-title":"PktGen","year":"2023","key":"ref17"},{"key":"ref18","first-page":"1","article-title":"Can the production network be the testbed?","volume-title":"Proc. USENIX OSDI","author":"Sherwood"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"volume-title":"Tofino","year":"2023","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"volume-title":"Mininet","year":"2023","key":"ref26"},{"volume-title":"Netperf","year":"2023","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/306225.306235"},{"volume-title":"Network Simulator","year":"2023","key":"ref29"},{"volume-title":"Emulab","year":"2023","key":"ref30"},{"volume-title":"Scapy","year":"2023","key":"ref31"},{"volume-title":"Netcat","year":"2023","key":"ref32"},{"volume-title":"harpoon","year":"2023","key":"ref33"},{"volume-title":"D-ITG","year":"2023","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2014.6857078"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2008.4636093"},{"volume-title":"TMIX","year":"2023","key":"ref37"},{"volume-title":"Nuttcp","year":"2023","key":"ref38"},{"volume-title":"SWING","year":"2023","key":"ref39"},{"volume-title":"Surge","year":"2023","key":"ref40"},{"volume-title":"ONST","year":"2023","key":"ref41"},{"volume-title":"Bit-Twist","year":"2023","key":"ref42"},{"volume-title":"GlobeTraff","year":"2023","key":"ref43"},{"volume-title":"IxNetwork","year":"2023","key":"ref44"},{"volume-title":"Nping","year":"2023","key":"ref45"},{"volume-title":"TRex","year":"2023","key":"ref46"},{"volume-title":"Ostinato","year":"2023","key":"ref47"},{"volume-title":"libcrafter","year":"2023","key":"ref48"},{"volume-title":"PackMime","year":"2023","key":"ref49"},{"volume-title":"SmartBits","year":"2023","key":"ref50"},{"volume-title":"Nemesis","year":"2023","key":"ref51"},{"volume-title":"LANforge","year":"2023","key":"ref52"},{"volume-title":"Mtools","year":"2023","key":"ref53"},{"volume-title":"NetSpec","year":"2023","key":"ref54"},{"volume-title":"Skaion TGS","year":"2023","key":"ref55"},{"volume-title":"Trafgen","year":"2023","key":"ref56"},{"volume-title":"RAMP","year":"2023","key":"ref57"},{"volume-title":"BRUTE","year":"2023","key":"ref58"},{"volume-title":"BreakingPoint","year":"2023","key":"ref59"},{"volume-title":"IP-Packet","year":"2023","key":"ref60"},{"volume-title":"Rude-Crude","year":"2023","key":"ref61"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2005.18"},{"volume-title":"Byte-Blower","year":"2023","key":"ref63"},{"volume-title":"Colosoft","year":"2023","key":"ref64"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214199"},{"volume-title":"GL Traffic Generator","year":"2023","key":"ref66"},{"volume-title":"HexInject","year":"2023","key":"ref67"},{"volume-title":"IPGen","year":"2023","key":"ref68"},{"volume-title":"IxChariot","year":"2023","key":"ref69"},{"volume-title":"KeysightdCX","year":"2023","key":"ref70"},{"volume-title":"EPB","year":"2023","key":"ref71"},{"volume-title":"Data Plane Development Kit","year":"2023","key":"ref72"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3488375"},{"volume-title":"TCPDUMP and LIBPCAP","year":"2023","key":"ref74"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2698"},{"key":"ref76","first-page":"1","article-title":"An efficient design of intelligent network data plane","volume-title":"Proc. USENIX Secur.","author":"Zhou"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/csac.2005.32"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405865"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"ref87","first-page":"1027","article-title":"Toward nearly-zero-error sketching via compressive sensing","volume-title":"Proc. USENIX NSDI","author":"Huang"},{"volume-title":"CAIDA Traces","year":"2023","key":"ref88"},{"article-title":"SLOG: Your switch is also your load-generator","volume-title":"Proc. USENIX NSDI Posters","author":"Kogias","key":"ref89"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365406"},{"issue":"4","key":"ref91","first-page":"1","article-title":"Apache flink: Stream and batch processing in a single engine","volume":"36","author":"Carbone","year":"2015","journal-title":"Bull. Tech. Committee Data Eng."},{"key":"ref92","first-page":"437","article-title":"Deter: Deterministic TCP replay for performance diagnosis","volume-title":"Proc. USENIX NSDI","author":"Li"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"},{"key":"ref95","first-page":"233","article-title":"Simplifying datacenter network debugging with PathDump","volume-title":"Proc. USENIX OSDI","author":"Tammana"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"volume-title":"DDoS Scripts","year":"2023","key":"ref97"},{"volume-title":"UFONet","year":"2023","key":"ref98"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10439254\/10145487.pdf?arnumber=10145487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T09:23:29Z","timestamp":1709285009000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10145487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":98,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3281449","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}