{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:42:56Z","timestamp":1773322976447,"version":"3.50.1"},"reference-count":77,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-09-10757"],"award-info":[{"award-number":["N00014-09-10757"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0225660CNS-0520241"],"award-info":[{"award-number":["CNS-0225660CNS-0520241"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2010,3]]},"abstract":"<jats:p>\n            This article presents the design, implementation, analysis, and experimental evaluation of\n            <jats:italic>speak-up<\/jats:italic>\n            , a defense against\n            <jats:italic>application-level<\/jats:italic>\n            distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (e.g., CPU cycles, disk). With speak-up, a victimized server encourages all clients, resources permitting,\n            <jats:italic>to automatically send higher volumes of traffic<\/jats:italic>\n            . We suppose that attackers are already using most of their upload bandwidth so cannot react to the encouragement. Good clients, however, have spare upload bandwidth so can react to the encouragement with drastically higher volumes of traffic. The intended outcome of this traffic inflation is that the good clients crowd out the bad ones, thereby capturing a much larger fraction of the server's resources than before. We experiment under various conditions and find that speak-up causes the server to spend resources on a group of clients in rough proportion to their aggregate upload bandwidths, which is the intended result.\n          <\/jats:p>","DOI":"10.1145\/1731060.1731063","type":"journal-article","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T02:56:32Z","timestamp":1270608992000},"page":"1-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["DDoS defense by offense"],"prefix":"10.1145","volume":"28","author":[{"given":"Michael","family":"Walfish","sequence":"first","affiliation":[{"name":"UT Austin, Austin TX"}]},{"given":"Mythili","family":"Vutukuru","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"David","family":"Karger","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley and ICSI"}]}],"member":"320","published-online":{"date-parts":[[2010,8,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064340.1064341"},{"key":"e_1_2_1_2_1","unstructured":"Agarwal S. Dawson T. and Tryfonas C. 2003. DDoS mitigation via regional cleaning centers. Sprint ATL Res. rep. RR04-ATL-013177.  Agarwal S. Dawson T. and Tryfonas C. 2003. DDoS mitigation via regional cleaning centers. Sprint ATL Res. rep. RR04-ATL-013177."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets).","author":"Anderson T.","unstructured":"Anderson , T. , Roscoe , T. , and Wetherall , D . 2003. Preventing Internet denial-of-service with capabilities . In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets). Anderson, T., Roscoe, T., and Wetherall, D. 2003. Preventing Internet denial-of-service with capabilities. In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets)."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the International Workshop on Security Protocols.","author":"Aura T.","unstructured":"Aura , T. , Nikander , P. , and Leiwo , J . 2000. DoS-resistant authentication with client puzzles . In Proceedings of the International Workshop on Security Protocols. Aura, T., Nikander, P., and Leiwo, J. 2000. DoS-resistant authentication with client puzzles. In Proceedings of the International Workshop on Security Protocols."},{"key":"e_1_2_1_5_1","unstructured":"Back A. 2002. Hashcash\u2014a denial of service counter-measure. http:\/\/www.cypherspace.org\/adam\/hashcash\/hashcash.pdf.  Back A. 2002. Hashcash\u2014a denial of service counter-measure. http:\/\/www.cypherspace.org\/adam\/hashcash\/hashcash.pdf."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316220"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Banga G.","unstructured":"Banga , G. , Druschel , P. , and Mogul , J. C . 1999. Resource containers: A new facility for resource management in server systems . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Banga, G., Druschel, P., and Mogul, J. C. 1999. Resource containers: A new facility for resource management in server systems. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_2_1_8_1","unstructured":"Boothe P. Hiebert J. and Bush R. 2006. Short-lived prefix hijacking on the Internet. Presentation to nanog. http:\/\/www.nanog.org\/mtg-0602\/pdf\/boothe.pdf.  Boothe P. Hiebert J. and Bush R. 2006. Short-lived prefix hijacking on the Internet. Presentation to nanog. http:\/\/www.nanog.org\/mtg-0602\/pdf\/boothe.pdf."},{"key":"e_1_2_1_9_1","unstructured":"Brown D. 2006. Gangsters hijack home PCs to choke internet with spam. The Times. http:\/\/business.timesonline.co.uk\/tol\/business\/law\/public_law\/article649541.ece.  Brown D. 2006. Gangsters hijack home PCs to choke internet with spam. The Times. http:\/\/business.timesonline.co.uk\/tol\/business\/law\/public_law\/article649541.ece."},{"key":"e_1_2_1_10_1","unstructured":"CNET News. 2005. Bots slim down to get tough. http:\/\/news.com.com\/Bots+slim+down+to+get+tough\/2100-7355_3-5956143.html.  CNET News. 2005. Bots slim down to get tough. http:\/\/news.com.com\/Bots+slim+down+to+get+tough\/2100-7355_3-5956143.html."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the USENIX Conference on Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI).","author":"Cooke E.","year":"2005","unstructured":"Cooke , E. , Jahanian , F. , and McPherson , D. 2005 . The zombie roundup: Understanding, detecting and disrupting botnets . In Proceedings of the USENIX Conference on Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI). Cooke, E., Jahanian, F., and McPherson, D. 2005. The zombie roundup: Understanding, detecting and disrupting botnets. In Proceedings of the USENIX Conference on Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)."},{"key":"e_1_2_1_12_1","volume-title":"Criminal complaint filed","year":"2004","unstructured":"cyberslam. 2004. Criminal complaint filed Aug. 25, 2004 , United States v. Ashley et al., No. 04 mj 02112 (Central District of California). http:\/\/www.reverse.net\/operationcyberslam.pdf. cyberslam. 2004. Criminal complaint filed Aug. 25, 2004, United States v. Ashley et al., No. 04 mj 02112 (Central District of California). http:\/\/www.reverse.net\/operationcyberslam.pdf."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS).","author":"Dagon D.","unstructured":"Dagon , D. , Zou , C. , and Lee , W . 2006. Modeling botnet propagation using time zones . In Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS). Dagon, D., Zou, C., and Lee, W. 2006. Modeling botnet propagation using time zones. In Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Dean D.","unstructured":"Dean , D. and Stubblefield , A . 2001. Using client puzzles to protect TLS . In Proceedings of the USENIX Security Symposium. Dean, D. and Stubblefield, A. 2001. Using client puzzles to protect TLS. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_15_1","first-page":"1","article-title":"Analysis and simulation of a fair queuing algorithm","volume":"25","author":"Demers A.","year":"1995","unstructured":"Demers , A. , Keshav , S. , and Shenker , S. 1995 . Analysis and simulation of a fair queuing algorithm . ACM SIGCOMM Comput. Comm. Rev. 25 , 1 . Demers, A., Keshav, S., and Shenker, S. 1995. Analysis and simulation of a fair queuing algorithm. ACM SIGCOMM Comput. Comm. Rev. 25, 1.","journal-title":"ACM SIGCOMM Comput. Comm. Rev."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of CRYPTO.","author":"Dwork C.","unstructured":"Dwork , C. , Goldberg , A. , and Naor , M . 2003. On memory-bound functions for fighting spam . In Proceedings of CRYPTO. Dwork, C., Goldberg, A., and Naor, M. 2003. On memory-bound functions for fighting spam. In Proceedings of CRYPTO."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of CRYPTO.","author":"Dwork C.","unstructured":"Dwork , C. and Naor , M . 1992. Pricing via processing or combatting junk mail . In Proceedings of CRYPTO. Dwork, C. and Naor, M. 1992. Pricing via processing or combatting junk mail. In Proceedings of CRYPTO."},{"key":"e_1_2_1_19_1","unstructured":"eWEEK. 2006. Money bots: Hackers cash in on hijacked PCs. http:\/\/www.eweek.com\/article2\/0 1895 2013957 00.asp.  eWEEK. 2006. Money bots: Hackers cash in on hijacked PCs. http:\/\/www.eweek.com\/article2\/0 1895 2013957 00.asp."},{"key":"e_1_2_1_20_1","unstructured":"Falk E. 2006. New host cloaking technique used by spammers. http:\/\/thespamdiaries.blogspot.com\/2006\/02\/new-host-cloaking-technique-used-by.html.  Falk E. 2006. New host cloaking technique used by spammers. http:\/\/thespamdiaries.blogspot.com\/2006\/02\/new-host-cloaking-technique-used-by.html."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052826"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944771"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1248656"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_19"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11542322_12"},{"key":"e_1_2_1_26_1","unstructured":"Google Captcha. 2005. Stupid Google virus\/spyware captcha page. http:\/\/plo.hostingprod.com\/@spyblog.org.uk\/blog\/2005\/06\/13\/stupid-google-virusspyware-cap.html.  Google Captcha. 2005. Stupid Google virus\/spyware captcha page. http:\/\/plo.hostingprod.com\/@spyblog.org.uk\/blog\/2005\/06\/13\/stupid-google-virusspyware-cap.html."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Gunter C. A.","unstructured":"Gunter , C. A. , Khanna , S. , Tan , K. , and Venkatesth , S . 2004. DoS protection for reliably authenticated broadcast . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Gunter, C. A., Khanna, S., Tan, K., and Venkatesth, S. 2004. DoS protection for reliably authenticated broadcast. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_2_1_28_1","unstructured":"Handley M. 2005. In a presentation to Internet architecture working group DoS-resistant Internet subgroup.  Handley M. 2005. In a presentation to Internet architecture working group DoS-resistant Internet subgroup."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016707.1016717"},{"key":"e_1_2_1_30_1","unstructured":"Honeynet Project and Research Alliance. 2005. Know your enemy: Tracking botnets. http:\/\/www.honeynet.org\/papers\/bots\/.  Honeynet Project and Research Alliance. 2005. Know your enemy: Tracking botnets. http:\/\/www.honeynet.org\/papers\/bots\/."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS).","author":"Juels A.","unstructured":"Juels , A. and Brainard , J . 1999. Client puzzles: A cryptographic countermeasure against connection depletion attacks . In Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS). Juels, A. and Brainard, J. 1999. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Kandula S.","unstructured":"Kandula , S. , Katabi , D. , Jacob , M. , and Berger , A . 2005. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Kandula, S., Katabi, D., Jacob, M., and Berger, A. 2005. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_33_1","volume-title":"The Art of Computer Programming","author":"Knuth D. E.","unstructured":"Knuth , D. E. 1998. The Art of Computer Programming 3 rd Ed., Vol. 2 . Addison-Wesley , Chapter 3.4.2. Knuth, D. E. 1998. The Art of Computer Programming 3rd Ed., Vol. 2. Addison-Wesley, Chapter 3.4.2.","edition":"3"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159918"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247415.1247430"},{"key":"e_1_2_1_36_1","unstructured":"Laurie B. and Clayton R. 2004. \u201cProof-of-Work\u201d proves not to work; version 0.2. http:\/\/www.cl.cam.ac.uk\/users\/rnc1\/proofwork2.pdf.  Laurie B. and Clayton R. 2004. \u201cProof-of-Work\u201d proves not to work; version 0.2. http:\/\/www.cl.cam.ac.uk\/users\/rnc1\/proofwork2.pdf."},{"key":"e_1_2_1_37_1","unstructured":"Lyon B. 2006. Private communication.  Lyon B. 2006. Private communication."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Mahimkar A.","unstructured":"Mahimkar , A. , Dange , J. , Shmatikov , V. , Vin , H. , and Zhang , Y . 2007. dFence: Transparent network-based denial of service mitigation . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Mahimkar, A., Dange, J., Shmatikov, V., Vin, H., and Zhang, Y. 2007. dFence: Transparent network-based denial of service mitigation. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the IEEE Computer Security Applications Conference.","author":"Mankins D.","unstructured":"Mankins , D. , Krishnan , R. , Boyd , C. , Zao , J. , and Frentz , M . 2001. Mitigating distributed denial of service attacks with dynamic resource pricing . In Proceedings of the IEEE Computer Security Applications Conference. Mankins, D., Krishnan, R., Boyd, C., Zao, J., and Frentz, M. 2001. Mitigating distributed denial of service attacks with dynamic resource pricing. In Proceedings of the IEEE Computer Security Applications Conference."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the USENIX Technical Conference.","author":"Mazi\u00e8res D.","year":"2001","unstructured":"Mazi\u00e8res , D. 2001 . A toolkit for user-level file systems . In Proceedings of the USENIX Technical Conference. Mazi\u00e8res, D. 2001. A toolkit for user-level file systems. In Proceedings of the USENIX Technical Conference."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2004.7"},{"key":"e_1_2_1_42_1","unstructured":"McPherson D. and Labovitz C. 2006. Worldwide infrastructure security report vol. II. Arbor Networks Inc. http:\/\/www.arbor.net\/downloads\/worldwide_infrastructure_security_report_sept06.pdf.  McPherson D. and Labovitz C. 2006. Worldwide infrastructure security report vol. II. Arbor Networks Inc. http:\/\/www.arbor.net\/downloads\/worldwide_infrastructure_security_report_sept06.pdf."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948114"},{"key":"e_1_2_1_45_1","unstructured":"Network World. 2005. Extortion via DDoS on the rise. http:\/\/www.networkworld.com\/news\/2005\/051605-ddos-extortion.html.  Network World. 2005. Extortion via DDoS on the rise. http:\/\/www.networkworld.com\/news\/2005\/051605-ddos-extortion.html."},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the USENIX Technical Conference.","author":"Park K.","unstructured":"Park , K. , Pai , V. S. , Lee , K.-W. , and Calo , S . 2006. Securing Web service by automatic robot detection . In Proceedings of the USENIX Technical Conference. Park, K., Pai, V. S., Lee, K.-W., and Calo, S. 2006. Securing Web service by automatic robot detection. In Proceedings of the USENIX Technical Conference."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"e_1_2_1_48_1","unstructured":"Pittsburgh Post-Gazette. 2003. CMU student taps brain's game skills. http:\/\/www.post-gazette.com\/pg\/03278\/228349.stm.  Pittsburgh Post-Gazette. 2003. CMU student taps brain's game skills. http:\/\/www.post-gazette.com\/pg\/03278\/228349.stm."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots). http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/rajab\/rajab.pdf.","author":"Rajab M. A.","unstructured":"Rajab , M. A. , Zarfoss , J. , Monrose , F. , and Terzis , A . 2007. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging . In Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots). http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/rajab\/rajab.pdf. Rajab, M. A., Zarfoss, J., Monrose, F., and Terzis, A. 2007. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots). http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/rajab\/rajab.pdf."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society.","author":"Ranjan S.","unstructured":"Ranjan , S. , Swaminathan , R. , Uysal , M. , and Knightly , E. W . 2006. DDoS-resilient scheduling to counter application layer attacks under imperfect detection . In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society. Ranjan, S., Swaminathan, R., Uysal, M., and Knightly, E. W. 2006. DDoS-resilient scheduling to counter application layer attacks under imperfect detection. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Society."},{"key":"e_1_2_1_54_1","unstructured":"Ratliff E. 2005. The zombie hunters. The New Yorker.  Ratliff E. 2005. The zombie hunters. The New Yorker."},{"key":"e_1_2_1_55_1","unstructured":"Register. 2003. East European gangs in online protection racket. http:\/\/www.theregister.co.uk\/2003\/11\/12\/east_european_gangs_in_online.  Register. 2003. East European gangs in online protection racket. http:\/\/www.theregister.co.uk\/2003\/11\/12\/east_european_gangs_in_online."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080102"},{"key":"e_1_2_1_57_1","unstructured":"SecurityFocus. 2004. FBI busts alleged DDoS mafia. http:\/\/www.securityfocus.com\/news\/9411.  SecurityFocus. 2004. FBI busts alleged DDoS mafia. http:\/\/www.securityfocus.com\/news\/9411."},{"key":"e_1_2_1_58_1","unstructured":"Sekar V. 2007. Private communication.  Sekar V. 2007. Private communication."},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the USENIX Technical Conference.","author":"Sekar V.","unstructured":"Sekar , V. , Duffield , N. , Spatscheck , O. , van der Merwe , J. , and Zhang , H . 2006. LADS: Large-scale automated DDoS detection system . In Proceedings of the USENIX Technical Conference. Sekar, V., Duffield, N., Spatscheck, O., van der Merwe, J., and Zhang, H. 2006. LADS: Large-scale automated DDoS detection system. In Proceedings of the USENIX Technical Conference."},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 1st Workshop on Secure Network Protocols.","author":"Sherr M.","unstructured":"Sherr , M. , Greenwald , M. , Gunter , C. A. , Khanna , S. , and Venkatesh , S. S . 2005. Mitigating DoS attack through selective bin verification . In Proceedings of the 1st Workshop on Secure Network Protocols. Sherr, M., Greenwald, M., Gunter, C. A., Khanna, S., and Venkatesh, S. S. 2005. Mitigating DoS attack through selective bin verification. In Proceedings of the 1st Workshop on Secure Network Protocols."},{"key":"e_1_2_1_61_1","volume-title":"CS6262","author":"Singh K. K.","year":"2006","unstructured":"Singh , K. K. 2006. Botnets\u2014An introduction. Course Project , CS6262 , Georgia Institute of Technology . http:\/\/www-static.cc.gatech.edu\/classes\/AY 2006 \/cs6262_spring\/botnets.ppt. Singh, K. K. 2006. Botnets\u2014An introduction. Course Project, CS6262, Georgia Institute of Technology. http:\/\/www-static.cc.gatech.edu\/classes\/AY2006\/cs6262_spring\/botnets.ppt."},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the ACM\/IFIP\/USENIX International Middleware Conference.","author":"Srivatsa M.","unstructured":"Srivatsa , M. , Iyengar , A. , Yin , J. , and Liu , L . 2006. A middleware system for protecting against application level denial of service attacks . In Proceedings of the ACM\/IFIP\/USENIX International Middleware Conference. Srivatsa, M., Iyengar, A., Yin, J., and Liu, L. 2006. A middleware system for protecting against application level denial of service attacks. In Proceedings of the ACM\/IFIP\/USENIX International Middleware Conference."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the International Conference on Applied Cryptography and Network Security.","author":"Stavrou A.","unstructured":"Stavrou , A. , Ioannidis , J. , Keromytis , A. D. , Misra , V. , and Rubenstein , D . 2004. A pay-per-use DoS protection mechanism for the Web . In Proceedings of the International Conference on Applied Cryptography and Network Security. Stavrou, A., Ioannidis, J., Keromytis, A. D., Misra, V., and Rubenstein, D. 2004. A pay-per-use DoS protection mechanism for the Web. In Proceedings of the International Conference on Applied Cryptography and Network Security."},{"key":"e_1_2_1_64_1","unstructured":"Sturgeon W. 2005. Denial of service attack victim speaks out. http:\/\/management.silicon.com\/smedirector\/0 39024679 39130810 00.htm.  Sturgeon W. 2005. Denial of service attack victim speaks out. http:\/\/management.silicon.com\/smedirector\/0 39024679 39130810 00.htm."},{"key":"e_1_2_1_65_1","unstructured":"TechWeb News. 2005. Dutch botnet bigger than expected. http:\/\/informationweek.com\/story\/showArticle.jhtml?articleID=172303265.  TechWeb News. 2005. Dutch botnet bigger than expected. http:\/\/informationweek.com\/story\/showArticle.jhtml?articleID=172303265."},{"key":"e_1_2_1_66_1","unstructured":"Thomas D. 2005. Deterrence must be the key to avoiding DDoS attacks. http:\/\/www.vnunet.com\/computing\/analysis\/2137395\/deterrence-key-avoiding-ddos-attacks.  Thomas D. 2005. Deterrence must be the key to avoiding DDoS attacks. http:\/\/www.vnunet.com\/computing\/analysis\/2137395\/deterrence-key-avoiding-ddos-attacks."},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the USENIX Technical Conference.","author":"Vasudevan R.","unstructured":"Vasudevan , R. , Mao , Z. M. , Spatscheck , O. , and van der Merwe, J. 2006. Reval: A tool for real-time evaluation of DDoS mitigation strategies . In Proceedings of the USENIX Technical Conference. Vasudevan, R., Mao, Z. M., Spatscheck, O., and van der Merwe, J. 2006. Reval: A tool for real-time evaluation of DDoS mitigation strategies. In Proceedings of the USENIX Technical Conference."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets).","author":"Walfish M.","unstructured":"Walfish , M. , Balakrishnan , H. , Karger , D. , and Shenker , S . 2005. DoS: Fighting fire with fire . In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets). Walfish, M., Balakrishnan, H., Karger, D., and Shenker, S. 2005. DoS: Fighting fire with fire. In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets)."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159948"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0042-x"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030117"},{"key":"e_1_2_1_74_1","unstructured":"Weber L. 2007a. Wikimedia request statistics. http:\/\/tools.wikimedia.de\/~leon\/stats\/reqstats.  Weber L. 2007a. Wikimedia request statistics. http:\/\/tools.wikimedia.de\/~leon\/stats\/reqstats."},{"key":"e_1_2_1_75_1","unstructured":"Weber L. 2007b. Wikimedia traffic statistics. http:\/\/tools.wikimedia.de\/~leon\/stats\/trafstats.  Weber L. 2007b. Wikimedia traffic statistics. http:\/\/tools.wikimedia.de\/~leon\/stats\/trafstats."},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Yaar A.","unstructured":"Yaar , A. , Perrig , A. , and Song , D . 2004. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks . In Proceedings of the IEEE Symposium on Security and Privacy. Yaar, A., Perrig, A., and Song, D. 2004. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080120"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1731060.1731063","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1731060.1731063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:27Z","timestamp":1750250487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1731060.1731063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":77,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["10.1145\/1731060.1731063"],"URL":"https:\/\/doi.org\/10.1145\/1731060.1731063","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3]]},"assertion":[{"value":"2008-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}