{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:06:03Z","timestamp":1776881163242,"version":"3.51.2"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/L026015\/1"],"award-info":[{"award-number":["EP\/L026015\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/L020009\/1"],"award-info":[{"award-number":["EP\/L020009\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N033957\/1"],"award-info":[{"award-number":["EP\/N033957\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tnsm.2018.2828938","type":"journal-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T18:06:49Z","timestamp":1524247609000},"page":"879-893","source":"Crossref","is-referenced-by-count":37,"title":["An Inter-Domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1786-8004","authenticated-orcid":false,"given":"Steven","family":"Simpson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5404-3706","authenticated-orcid":false,"given":"Syed Noorulhassan","family":"Shirazi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7996-6216","authenticated-orcid":false,"given":"Angelos","family":"Marnerides","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Simon","family":"Jouet","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0939-378X","authenticated-orcid":false,"given":"Dimitrios","family":"Pezaros","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6052-0559","authenticated-orcid":false,"given":"David","family":"Hutchison","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","first-page":"999","article-title":"A framework for enabling security services collaboration across multiple domains","author":"migault","year":"2017","journal-title":"Proc 37th Int Conf Distrib Comput Syst"},{"key":"ref32","author":"danyliw","year":"2015","journal-title":"DDoS open threat signaling (DOTS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5575"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2007431"},{"key":"ref34","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","author":"fayaz","year":"2015","journal-title":"Proc 24th USENIX Secur Symp (USENIX Security)"},{"key":"ref10","first-page":"926","article-title":"POSTER: A secure, practical & safe packet spoofing service","author":"scott","year":"2017","journal-title":"Proc ACM Asia Conf Comput Commun Security"},{"key":"ref11","first-page":"365","article-title":"Identifying legitimate clients under distributed denial-of-service attacks","author":"simpson","year":"2010","journal-title":"Proc 4th Int Conf Netw Syst Security"},{"key":"ref12","article-title":"Pattern based packet filtering using NetFPGA in DETER infrastructure","author":"goodney","year":"2010","journal-title":"Proceedings of the 1st Asia NetFPGA Developers Workshop"},{"key":"ref13","first-page":"55","article-title":"Dynamic packet-filtering in high-speed networks using NetFPGAs","author":"engelmann","year":"2014","journal-title":"Proc Int Conf Future Gener Commun Technol"},{"key":"ref14","article-title":"Secure in-packet Bloom filter forwarding on the NetFPGA","author":"ghani","year":"2010","journal-title":"Proc of the European NetFPGA Developers Workshop"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2017.14"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref18","author":"niccolai","year":"2017","journal-title":"Analyst Puts Hacker Damage at $1 2 Billion and Rising"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.219"},{"key":"ref4","author":"khandelwal","year":"2016","journal-title":"602 gbps! this may have been the largo ddos attack in history"},{"key":"ref27","article-title":"dFence: Transparent network-based denial of service mitigation","author":"mahimkar","year":"2007","journal-title":"Proc Symp Netw Syst Design Implementation"},{"key":"ref3","author":"sharwood","year":"2015","journal-title":"GitHub Wobbles Under DDOS Attack"},{"key":"ref6","author":"schneier","year":"2016","journal-title":"Lessons from the dyn ddos attack"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2006.250484"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"ref7","article-title":"State of the Internet security report","author":"mckeay","year":"2017"},{"key":"ref2","first-page":"279","article-title":"Measuring the adoption of DDoS protection services","author":"jonker","year":"2016","journal-title":"Proc of Internet Measurement Conference (IMC)"},{"key":"ref9","first-page":"53","article-title":"The spoofer project: Inferring the extent of source address filtering on the Internet","author":"beverly","year":"2005","journal-title":"USENIX SRUTI Workshop"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref20","first-page":"1","article-title":"Comparison and evaluation of digital signature schemes employed in NDN network","volume":"5","author":"ali","year":"2015","journal-title":"Int J Embed Syst Appl"},{"key":"ref22","first-page":"489","article-title":"SipHash: A fast short-input PRF","author":"aumasson","year":"2012","journal-title":"Proc 13th Int Conf Cryptol Progr Cryptol (INDOCRYPT)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2827"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/978-3-540-30494-4_26","article-title":"Bloom filters in probabilistic verification","author":"dillinger","year":"2004","journal-title":"Proc 5th Int Conf Formal Methods Comput -Aided Design (FMCAD)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282413"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/8457428\/08344498.pdf?arnumber=8344498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:34:58Z","timestamp":1643193298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8344498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":34,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2018.2828938","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}