{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:42:11Z","timestamp":1759092131088},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,11]]},"DOI":"10.1145\/1162666.1162675","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"161-168","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Analyzing large DDoS attacks using multiple data sources"],"prefix":"10.1145","author":[{"given":"Z. Morley","family":"Mao","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Oliver","family":"Spatscheck","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research"}]},{"given":"Jacobus","family":"van der Merwe","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research"}]},{"given":"Rangarajan","family":"Vasudevan","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2006,9,11]]},"reference":[{"unstructured":"R. Richmond \"Firms Join Forces Against Hackers \" Wall Street Journal March 28 2005.  R. Richmond \"Firms Join Forces Against Hackers \" Wall Street Journal March 28 2005.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"August","author":"Moore D.","year":"2001","unstructured":"D. Moore , G. Voelker , and S. Savage , \" Inferring Internet Denial of Service Activity,\" in Proceedings of the 2001 USENIX Security Symposium , August 2001 . D. Moore, G. Voelker, and S. Savage, \"Inferring Internet Denial of Service Activity,\" in Proceedings of the 2001 USENIX Security Symposium, August 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"Internet Denial of Service: Attack and Defense Mechanisms","author":"Mirkovic J.","year":"2005","unstructured":"J. Mirkovic , S. Dietrich , D. Dittrich , and P. Reiher , Internet Denial of Service: Attack and Defense Mechanisms . Prentice Hall , 2005 . J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, 2005."},{"key":"e_1_3_2_1_4_1","volume-title":"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing.\" RFC","author":"Ferguson P.","year":"1998","unstructured":"P. Ferguson and D. Senie , \" Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing.\" RFC 2267, January 1998 . P. Ferguson and D. Senie, \"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing.\" RFC 2267, January 1998."},{"key":"e_1_3_2_1_5_1","first-page":"2005","author":"Beverly R.","year":"2005","unstructured":"R. Beverly , \" The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet .\" roceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop ( SRUTI 2005 ), July 2005 . R. Beverly, \"The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet.\" roceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 2005), July 2005.","journal-title":"SRUTI"},{"key":"e_1_3_2_1_6_1","volume-title":"March","author":"Project The Honeynet","year":"2005","unstructured":"The Honeynet Project & Research Alliance , \" Know your Enemy : Tracking Botnets.\" http:\/\/www.honeynet.org\/papers\/bots\/ , March 2005 . The Honeynet Project & Research Alliance, \"Know your Enemy: Tracking Botnets.\" http:\/\/www.honeynet.org\/papers\/bots\/, March 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Annual Technical Conference","author":"Sekar V.","year":"2006","unstructured":"V. Sekar , N. Duffleld , J. van der Merwe, O. Spatscheck, and H. Zhang, \"LADS: Large-scale Automated DDoS Detection System,\" in Proc . USENIX Annual Technical Conference , 2006 . V. Sekar, N. Duffleld, J. van der Merwe, O. Spatscheck, and H. Zhang, \"LADS: Large-scale Automated DDoS Detection System,\" in Proc. USENIX Annual Technical Conference, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/505202.505232"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/948205.948228"},{"key":"e_1_3_2_1_10_1","first-page":"2003","author":"Nazario J.","year":"2003","unstructured":"J. Nazario , \" Trends in Denial of Service Attacks .\" WIP of Usenix Security 2003 , 2003 . J. Nazario, \"Trends in Denial of Service Attacks.\" WIP of Usenix Security 2003, 2003.","journal-title":"WIP of Usenix Security"},{"key":"e_1_3_2_1_11_1","volume-title":"Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event,\" in Proceedings of ACM IMC","author":"Kumar A.","year":"2005","unstructured":"A. Kumar , V. Paxson , and N. Weaver , \" Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event,\" in Proceedings of ACM IMC , 2005 . A. Kumar, V. Paxson, and N. Weaver, \"Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event,\" in Proceedings of ACM IMC, 2005."},{"unstructured":"\"Cisco Guard.\" http:\/\/www.cisco.com\/en\/US\/products\/ps5888\/.  \"Cisco Guard.\" http:\/\/www.cisco.com\/en\/US\/products\/ps5888\/.","key":"e_1_3_2_1_12_1"}],"event":{"acronym":"SIGCOMM06","name":"SIGCOMM06: ACM SIGCOMM 2006 Conference","location":"Pisa Italy"},"container-title":["Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1162666.1162675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T11:37:08Z","timestamp":1673523428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1162666.1162675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,11]]},"references-count":12,"alternative-id":["10.1145\/1162666.1162675","10.1145\/1162666"],"URL":"https:\/\/doi.org\/10.1145\/1162666.1162675","relation":{},"subject":[],"published":{"date-parts":[[2006,9,11]]},"assertion":[{"value":"2006-09-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}