{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:04Z","timestamp":1750221244169,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3229598.3229606","type":"proceedings-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T19:07:07Z","timestamp":1533150427000},"page":"8-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["How Media Reports Trigger Copycats"],"prefix":"10.1145","author":[{"given":"Vincent","family":"Ghi\u00ebtte","sequence":"first","affiliation":[{"name":"TU Delft, Cyber Security Group, Delft, Netherlands"}]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[{"name":"TU Delft, Cyber Security Group, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Brad Fitzpatrick. 2004. Distributed caching with memcached. In Linux Journal.   Brad Fitzpatrick. 2004. Distributed caching with memcached. In Linux Journal."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Johannes Krupp Mohammad Karami Christian Rossow Damon McCoy and Michael Backes. 2017. Linking Amplification DDoS Attacks to Booter Services. In RAID.  Johannes Krupp Mohammad Karami Christian Rossow Damon McCoy and Michael Backes. 2017. Linking Amplification DDoS Attacks to Booter Services. In RAID.","DOI":"10.1007\/978-3-319-66332-6_19"},{"key":"e_1_3_2_1_4_1","volume-title":"Black hat","author":"Novikov Ivan","year":"2014","unstructured":"Ivan Novikov . 2014. The New Page of Injections Book: Memcached Injections . In Black hat 2014 . Ivan Novikov. 2014. The New Page of Injections Book: Memcached Injections. In Black hat 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"key":"e_1_3_2_1_6_1","unstructured":"Memcached protocol. 2017. https:\/\/github.com\/memcached\/memcached\/blob\/master\/doc\/protocol.txt. (2017).  Memcached protocol. 2017. https:\/\/github.com\/memcached\/memcached\/blob\/master\/doc\/protocol.txt. (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In NDSS.","author":"Rossow Christian","year":"2014","unstructured":"Christian Rossow . 2014 . Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In NDSS. Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In NDSS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"},{"key":"e_1_3_2_1_9_1","unstructured":"Sensepost. 2010. Cache on Delivery. In Black Hat.  Sensepost. 2010. Cache on Delivery. In Black Hat."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945057"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229598.3229606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229598.3229606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:37Z","timestamp":1750212457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229598.3229606"}},"subtitle":["An Analysis of the Brewing of the Largest Packet Storm to Date"],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":9,"alternative-id":["10.1145\/3229598.3229606","10.1145\/3229598"],"URL":"https:\/\/doi.org\/10.1145\/3229598.3229606","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}