{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:35:24Z","timestamp":1725672924590},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,11]]},"DOI":"10.1145\/1162666.1162673","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"147-154","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["PRIMED"],"prefix":"10.1145","author":[{"given":"Patrick","family":"Verkaik","sequence":"first","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Oliver","family":"Spatscheck","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research"}]},{"given":"Jacobus","family":"Van der Merwe","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research"}]},{"given":"Alex C.","family":"Snoeren","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]}],"member":"320","published-online":{"date-parts":[[2006,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Communications Innovation Institute. Summary of the initial meeting of the DoS-resistant Internet working group. http:\/\/www.thecii.org\/dos-resistant\/meeting-1\/summary.html.  Communications Innovation Institute. Summary of the initial meeting of the DoS-resistant Internet working group. http:\/\/www.thecii.org\/dos-resistant\/meeting-1\/summary.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Distributed intrusion detection system. www. dshield. org.  Distributed intrusion detection system. www. dshield. org."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_7"},{"key":"e_1_3_2_1_4_1","volume-title":"SRUTI Workshop","author":"Allman M.","year":"2005","unstructured":"M. Allman , E. Blanton , and V. Paxson . An architecture for developing behavioral history . SRUTI Workshop , July 2005 . M. Allman, E. Blanton, and V. Paxson. An architecture for developing behavioral history. SRUTI Workshop, July 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3704"},{"key":"e_1_3_2_1_6_1","volume-title":"ACM HotNets Workshop","author":"Ballani H.","year":"2005","unstructured":"H. Ballani , Y. Chawathe , S. Ratnasamy , T. Roscoe , and S. Shenker . Off by default! In Proc . ACM HotNets Workshop , Nov. 2005 . H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker. Off by default! In Proc. ACM HotNets Workshop, Nov. 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. ACM\/USENIX NSDI","author":"Casado M.","year":"2006","unstructured":"M. Casado , T. Garfinkel , A. Akella , D. Boneh , N. McKeown , and S. Shenker . SANE: A protection architecture for enterprise networks . In Proc. ACM\/USENIX NSDI , May 2006 . M. Casado, T. Garfinkel, A. Akella, D. Boneh, N. McKeown, and S. Shenker. SANE: A protection architecture for enterprise networks. In Proc. ACM\/USENIX NSDI, May 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6302"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814615"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. NDSS","author":"Ioannidis J.","year":"2002","unstructured":"J. Ioannidis and S. M. Bellovin . Implementing pushback: Router-based defense against DDoS attacks . In Proc. NDSS , Feb. 2002 . J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In Proc. NDSS, Feb. 2002."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. ACM\/USENIX NSDI","author":"Kandula S.","year":"2005","unstructured":"S. Kandula , D. Katabi , M. Jacob , and A. Berger . Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds . In Proc. ACM\/USENIX NSDI , May 2005 . S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proc. ACM\/USENIX NSDI, May 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162675"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. NDSS","author":"McDaniel P.","year":"2006","unstructured":"P. McDaniel , S. Sen , O. Spatscheck , J. Van der Merwe, W. Aiello, and C. Kalmanek. Enterprise security: A community of interest based approach . In Proc. NDSS , Feb. 2006 . P. McDaniel, S. Sen, O. Spatscheck, J. Van der Merwe, W. Aiello, and C. Kalmanek. Enterprise security: A community of interest based approach. In Proc. NDSS, Feb. 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015487"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. USENIX OSDI","author":"Singh S.","year":"2004","unstructured":"S. Singh , C. Estan , G. Varghese , and S. Savage . Automated worm fingerprinting . In Proc. USENIX OSDI , Dec. 2004 . S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In Proc. USENIX OSDI, Dec. 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. USENIX Security","author":"Staniford S.","year":"2002","unstructured":"S. Staniford , V. Paxson , and N. Weaver . How to Own the Internet in your spare time . In Proc. USENIX Security , Aug. 2002 . S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in your spare time. In Proc. USENIX Security, Aug. 2002."},{"key":"e_1_3_2_1_20_1","unstructured":"The Honeynet Project. Know your enemy: Tracking botnets. http:\/\/www.honeynet.org\/papers\/bots.  The Honeynet Project. Know your enemy: Tracking botnets. http:\/\/www.honeynet.org\/papers\/bots."},{"key":"e_1_3_2_1_21_1","volume-title":"AT&T Labs-Research","author":"Verkaik P.","year":"2006","unstructured":"P. Verkaik , O. Spatscheck , J. Van der Merwe , and A. C. Snoeren . PRIMED: A community-of-interest-based DDoS mitigation system. Technical report , AT&T Labs-Research , Apr. 2006 . P. Verkaik, O. Spatscheck, J. Van der Merwe, and A. C. Snoeren. PRIMED: A community-of-interest-based DDoS mitigation system. Technical report, AT&T Labs-Research, Apr. 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.768484"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. IEEE Security and Privacy","author":"Yaar A.","year":"2004","unstructured":"A. Yaar , A. Perrig , and D. Song . An endhost capability mechanism to mitigate DDoS flooding attacks . In Proc. IEEE Security and Privacy , May 2004 . A. Yaar, A. Perrig, and D. Song. An endhost capability mechanism to mitigate DDoS flooding attacks. In Proc. IEEE Security and Privacy, May 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080120"}],"event":{"name":"SIGCOMM06: ACM SIGCOMM 2006 Conference","acronym":"SIGCOMM06","location":"Pisa Italy"},"container-title":["Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1162666.1162673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T11:36:47Z","timestamp":1673523407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1162666.1162673"}},"subtitle":["community-of-interest-based DDoS mitigation"],"short-title":[],"issued":{"date-parts":[[2006,9,11]]},"references-count":25,"alternative-id":["10.1145\/1162666.1162673","10.1145\/1162666"],"URL":"https:\/\/doi.org\/10.1145\/1162666.1162673","relation":{},"subject":[],"published":{"date-parts":[[2006,9,11]]},"assertion":[{"value":"2006-09-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}