{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:12:39Z","timestamp":1751951559884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000172","name":"Division of Undergraduate Education","doi-asserted-by":"publisher","award":["DUE-1141341DUE-1141314"],"award-info":[{"award-number":["DUE-1141341DUE-1141314"]}],"id":[{"id":"10.13039\/100000172","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,12]]},"DOI":"10.1145\/2390317.2390321","type":"proceedings-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T16:42:56Z","timestamp":1352306576000},"page":"21-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Hands-on denial of service lab exercises using SlowLoris and RUDY"],"prefix":"10.1145","author":[{"given":"Evan","family":"Damon","sequence":"first","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR"}]},{"given":"Julian","family":"Dale","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR"}]},{"given":"Evaristo","family":"Laron","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR"}]},{"given":"Jens","family":"Mache","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR"}]},{"given":"Nathan","family":"Land","sequence":"additional","affiliation":[{"name":"Renesys Corp., Hanover, NH"}]},{"given":"Richard","family":"Weiss","sequence":"additional","affiliation":[{"name":"Evergreen State College, Olympia, WA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The HTTP POST Distributed Denial of Service Exploit. INFS","author":"Anpilova N.","year":"2011","unstructured":"Anpilova , N. , Das , S. , Goodhart , B. , Marsh , S , 2011. The HTTP POST Distributed Denial of Service Exploit. INFS 612 Summer 2011 PGN #1 Anpilova, N., Das, S., Goodhart, B., Marsh, S, 2011. The HTTP POST Distributed Denial of Service Exploit. INFS 612 Summer 2011 PGN#1"},{"key":"e_1_3_2_1_2_1","volume-title":"DEFCON '09","author":"Bowne S.","year":"2009","unstructured":"Bowne , S. , 2009 . Slowloris - stopping Apache Web servers . DEFCON '09 . http:\/\/samsclass.info\/seminars\/DEFCON09_Bowne_Slowloris.doc Bowne, S., 2009. Slowloris - stopping Apache Web servers. DEFCON '09. http:\/\/samsclass.info\/seminars\/DEFCON09_Bowne_Slowloris.doc"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.115"},{"key":"e_1_3_2_1_4_1","unstructured":"Du W. 2011. SEED Project. Syracuse University. http:\/\/www.cis.syr.edu\/~wedu\/seed\/  Du W. 2011. SEED Project. Syracuse University. http:\/\/www.cis.syr.edu\/~wedu\/seed\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231056"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Tridentcom","author":"Mirkovic J.","year":"2007","unstructured":"Mirkovic , J. , Wei , S. , Hussain , A. , Wilson , B. , Thomas , R. , Schwab , Fahmy, S., Chertov , R. , and Reiher , P ., 2007. DDoS benchmarks and experimenter's workbench for the DETER testbed . In Proceedings of the Tridentcom 2007 , May. http:\/\/www.eecis.udel.edu\/~sunshine\/publications\/tric.pdf Mirkovic, J., Wei, S., Hussain, A., Wilson, B., Thomas, R., Schwab, Fahmy, S., Chertov, R., and Reiher, P., 2007. DDoS benchmarks and experimenter's workbench for the DETER testbed. In Proceedings of the Tridentcom 2007, May. http:\/\/www.eecis.udel.edu\/~sunshine\/publications\/tric.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1488734.1490106"},{"volume-title":"Principles of Computer Security CompTIA Security+ and Beyond Lab Manual","author":"Nestler V.","key":"e_1_3_2_1_8_1","unstructured":"Nestler , V. , White , G. , Conklin , W. , Hirsch , M. , Schou , C. 2011. Principles of Computer Security CompTIA Security+ and Beyond Lab Manual , Second Edition. Nestler, V., White, G., Conklin, W., Hirsch, M., Schou, C. 2011. Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition."},{"volume-title":"Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing","author":"Tavani H.","key":"e_1_3_2_1_9_1","unstructured":"Tavani , H. 2010. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing , Wiley . Tavani, H. 2010. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, Wiley."},{"key":"e_1_3_2_1_10_1","unstructured":"Taylor B. Azadegan S. Kaza S. O'Leary M. Turner C. 2012. Security Injections. Towson University.  Taylor B. Azadegan S. Kaza S. O'Leary M. Turner C. 2012. Security Injections. Towson University."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047456.2047468"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1731060.1731063"},{"key":"e_1_3_2_1_13_1","volume-title":"Re: a cheesy Apache \/ IIS DoS vulnerability (and a question). Bugtraq. Retrieved","author":"Zalewski","year":"2012","unstructured":"Zalewski , M; Ciobanu, A. I. 2007. Re: a cheesy Apache \/ IIS DoS vulnerability (and a question). Bugtraq. Retrieved July 6, 2012 http:\/\/www.securityfocus.com\/archive\/1\/455833\/30\/0\/threaded Zalewski, M; Ciobanu, A. I. 2007. Re: a cheesy Apache \/ IIS DoS vulnerability (and a question). Bugtraq. Retrieved July 6, 2012 http:\/\/www.securityfocus.com\/archive\/1\/455833\/30\/0\/threaded"}],"event":{"name":"InfoSecCD'12: Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD'12"},"container-title":["Proceedings of the 2012 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390317.2390321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2390317.2390321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:46Z","timestamp":1750235746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390317.2390321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":13,"alternative-id":["10.1145\/2390317.2390321","10.1145\/2390317"],"URL":"https:\/\/doi.org\/10.1145\/2390317.2390321","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"2012-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}