{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:23Z","timestamp":1750308203293,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030118","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"257-267","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Mitigating bandwidth-exhaustion attacks using congestion puzzles"],"prefix":"10.1145","author":[{"given":"XiaoFeng","family":"Wang","sequence":"first","affiliation":[{"name":"Indiana University at Bloomington, Bloomington, IN"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The network simulator - ns-2. http:\/\/www.isi.edu\/nsnam\/ns\/.]]  The network simulator - ns-2. http:\/\/www.isi.edu\/nsnam\/ns\/.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"Overview of cisco 7500 series router. http:\/\/www.cisco.com\/en\/US\/products\/hw\/routers\/ps359\/prod_brochure09186a008009200c.html.]]  Overview of cisco 7500 series router. http:\/\/www.cisco.com\/en\/US\/products\/hw\/routers\/ps359\/prod_brochure09186a008009200c.html.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium","author":"Abadi M.","year":"2003","unstructured":"M. Abadi , M. Burrow , M. Manasse , and T. Wobber . Moderately hard, memory-bound functions . In Proceedings of the 10th Annual Network and Distributed System Security Symposium , 2003 .]] M. Abadi, M. Burrow, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509969"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Cambridge Security Protocols Worshop 2000","author":"Aura T.","year":"2000","unstructured":"T. Aura , P. Nikander , and J. Leiwo . Dos-resistant authentication with client puzzles . In Proceedings of the Cambridge Security Protocols Worshop 2000 . LNCS, Springer-Verlag , 2000 .]] T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Proceedings of the Cambridge Security Protocols Worshop 2000. LNCS, Springer-Verlag, 2000.]]"},{"key":"e_1_3_2_1_6_1","volume-title":"ICMP type numbers","author":"Authority I. A. N.","year":"2003","unstructured":"I. A. N. Authority . ICMP type numbers . November , 2003 . http:\/\/www.iana.org\/assignments\/icmp-parameters.]] I. A. N. Authority. ICMP type numbers. November, 2003. http:\/\/www.iana.org\/assignments\/icmp-parameters.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_8_1","volume-title":"Internet-Draft, draft-ietf-itrace-01.txt","author":"Bellovin S.","year":"1999","unstructured":"S. Bellovin , M. Leech , and T. Taylor . The ICMP traceback messages . In Internet-Draft, draft-ietf-itrace-01.txt , December 1999 . ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-ietf-itrace-01.txt.]] S. Bellovin, M. Leech, and T. Taylor. The ICMP traceback messages. In Internet-Draft, draft-ietf-itrace-01.txt, December 1999. ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-ietf-itrace-01.txt.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Data Networks","author":"Bertsekas D.","year":"1992","unstructured":"D. Bertsekas and R. Gallager . Data Networks . Prentice-Hall , Englewood- Cliffs, New Jersey, USA, 1992 .]] D. Bertsekas and R. Gallager. Data Networks. Prentice-Hall, Englewood-Cliffs, New Jersey, USA, 1992.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_11_1","volume-title":"Unpublished paper","author":"Burch H.","year":"1999","unstructured":"H. Burch and B. Cheswick . Tracing anonymous packets to their approximate source . In Unpublished paper , December 1999 .]] H. Burch and B. Cheswick. Tracing anonymous packets to their approximate source. In Unpublished paper, December 1999.]]"},{"key":"e_1_3_2_1_12_1","unstructured":"Caida. Skitter. 2003. http:\/\/www.caida.org\/tools\/measurement\/skitter.]]  Caida. Skitter. 2003. http:\/\/www.caida.org\/tools\/measurement\/skitter.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of Network and Distributed System Security Symposium (NDSS-01)","author":"Dean D.","year":"2001","unstructured":"D. Dean , M. Franklin , and A. Stubblefield . An algebraic approach to ip traceback . In Proceedings of Network and Distributed System Security Symposium (NDSS-01) , February 2001 .]] D. Dean, M. Franklin, and A. Stubblefield. An algebraic approach to ip traceback. In Proceedings of Network and Distributed System Security Symposium (NDSS-01), February 2001.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of 10th Annual USENIX Security Symposium","author":"Dean D.","year":"2001","unstructured":"D. Dean and A. Stubblefield . Using client puzzles to protect tls . In Proceedings of 10th Annual USENIX Security Symposium , 2001 .]] D. Dean and A. Stubblefield. Using client puzzles to protect tls. In Proceedings of 10th Annual USENIX Security Symposium, 2001.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/75246.75248"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944771"},{"key":"e_1_3_2_1_17_1","volume-title":"Jan.","author":"Ferguson P.","year":"1998","unstructured":"P. Ferguson and D. Senie . RFC 2267: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing , Jan. 1998 . ftp:\/\/ftp.internic.net\/rfc\/rfc2267.txt, ftp:\/\/ftp.math.utah.edu\/pub\/rfc\/rfc2267.txt.]] P. Ferguson and D. Senie. RFC 2267: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, Jan. 1998. ftp:\/\/ftp.internic.net\/rfc\/rfc2267.txt, ftp:\/\/ftp.math.utah.edu\/pub\/rfc\/rfc2267.txt.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.793002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/6294.869381"},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the Security Protocols Workshop","author":"Gligor V.","year":"2004","unstructured":"V. Gligor . Guaranteeing access in spite of service-flooding attack . In R. Hirschfeld, editor, Proceedings of the Security Protocols Workshop , Lecture Notes in Computer Science . Springer-Verlag , 2004 .]] V. Gligor. Guaranteeing access in spite of service-flooding attack. In R. Hirschfeld, editor, Proceedings of the Security Protocols Workshop, Lecture Notes in Computer Science. Springer-Verlag, 2004.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS-02)","author":"Ioannidis J.","year":"2002","unstructured":"J. Ioannidis and S. Bellovin . Implementing pushback: Router-based defense against ddos attacks . In Proceedings of the Symposium on Network and Distributed System Security (NDSS-02) , 2002 .]] J. Ioannidis and S. Bellovin. Implementing pushback: Router-based defense against ddos attacks. In Proceedings of the Symposium on Network and Distributed System Security (NDSS-02), 2002.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"e_1_3_2_1_23_1","first-page":"151","volume-title":"Proceedings of NDSS'99","author":"Juels A.","year":"1999","unstructured":"A. Juels and J. Brainard . Client puzzle: A cryptographic defense against connection depletion attacks. In S.Kent, editor , Proceedings of NDSS'99 , pages 151 -- 165 , 1999 .]] A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S.Kent, editor, Proceedings of NDSS'99, pages 151--165, 1999.]]"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of IEEE INFOCOM","author":"Li J.","year":"2002","unstructured":"J. Li , J. Mirkovic , and M. Wang . Save: Source address validity enforcement protocol . In Proceedings of IEEE INFOCOM , 2002 .]] J. Li, J. Mirkovic, and M. Wang. Save: Source address validity enforcement protocol. In Proceedings of IEEE INFOCOM, 2002.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/876907.881562"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948114"},{"key":"e_1_3_2_1_28_1","volume-title":"Sept.","author":"Postel J.","year":"1981","unstructured":"J. Postel . RFC 792: Internet Control Message Protocol , Sept. 1981 . ftp:\/\/ftp.internic.net\/rfc\/rfc792.txt.]] J. Postel. RFC 792: Internet Control Message Protocol, Sept. 1981. ftp:\/\/ftp.internic.net\/rfc\/rfc792.txt.]]"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40974-8_26"},{"key":"e_1_3_2_1_30_1","first-page":"01","article-title":"Hardware support for a hash-based ip traceback","author":"Sanchez L.","year":"2001","unstructured":"L. Sanchez , W. Milliken , A. Snoeren , F. Tchakountio , C. Jones , S. Kent , C. Partridge , and W. Strayer . Hardware support for a hash-based ip traceback . In Proceedings of the DARPA Information Survivability Conference and Exposition II , 2001 . DISCEX' 01 .]] L. Sanchez, W. Milliken, A. Snoeren, F. Tchakountio, C. Jones, S. Kent, C. Partridge, and W. Strayer. Hardware support for a hash-based ip traceback. In Proceedings of the DARPA Information Survivability Conference and Exposition II, 2001. DISCEX'01.]]","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the DARPA Information Survivability Conference and Exposition 2000","author":"Schnackenberg D.","year":"2000","unstructured":"D. Schnackenberg , K. Djahandari , and D. Sterne . Infrastructure for intrusion detection and response . In Proceedings of the DARPA Information Survivability Conference and Exposition 2000 , March 2000 .]] D. Schnackenberg, K. Djahandari, and D. Sterne. Infrastructure for intrusion detection and response. In Proceedings of the DARPA Information Survivability Conference and Exposition 2000, March 2000.]]"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of IEEE INFOCOMM","author":"Song D.","year":"2001","unstructured":"D. Song and A. Perrig . Advanced and authenticated marking schemes for ip traceback . In Proceedings of IEEE INFOCOMM , April 2001 .]] D. Song and A. Perrig. Advanced and authenticated marking schemes for ip traceback. In Proceedings of IEEE INFOCOMM, April 2001.]]"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285273"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Stone R.","year":"2000","unstructured":"R. Stone . An ip overlay network for tracking dos floods . In Proceedings of USENIX Security Symposium , 2000 .]] R. Stone. An ip overlay network for tracking dos floods. In Proceedings of USENIX Security Symposium, 2000.]]"},{"key":"e_1_3_2_1_37_1","volume-title":"June","author":"Touch J.","year":"1995","unstructured":"J. Touch . RFC 1810: Report on MD5 performance , June 1995 . ftp:\/\/ftp.internic.net\/rfc\/rfc1810.txt, ftp:\/\/ftp.math.utah.edu\/pub\/rfc\/rfc1810.txt.]] J. Touch. RFC 1810: Report on MD5 performance, June 1995. ftp:\/\/ftp.internic.net\/rfc\/rfc1810.txt, ftp:\/\/ftp.math.utah.edu\/pub\/rfc\/rfc1810.txt.]]"},{"key":"e_1_3_2_1_38_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Wang X.","year":"2003","unstructured":"X. Wang and M. Reiter . Defending against denial-of-service attacks with puzzle auctions . In IEEE Symposium on Security and Privacy , May 2003 .]] X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, May 2003.]]"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830562"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2002.1006572"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":40,"alternative-id":["10.1145\/1030083.1030118","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030118","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}