{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:45Z","timestamp":1767339765815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274717","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"266-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["SENSS Against Volumetric DDoS Attacks"],"prefix":"10.1145","author":[{"given":"Sivaramakrishnan","family":"Ramanathan","sequence":"first","affiliation":[{"name":"USC\/ISI, Los Angeles, CA"}]},{"given":"Jelena","family":"Mirkovic","sequence":"additional","affiliation":[{"name":"USC\/ISI, Los Angeles, CA"}]},{"given":"Minlan","family":"Yu","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA"}]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[{"name":"Facebook, Inc., Menlo Park, CA"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05)","author":"Argyraki Katerina","key":"e_1_3_2_1_1_1","unstructured":"Katerina Argyraki and David R. Cheriton . 2005. Active Internet Traffic Filtering: Real-time Response to Denial-of-service Attacks . In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05) . USENIX Association, Berkeley, CA, USA, 10--10. http:\/\/dl.acm.org\/citation.cfm?id=1247360.1247370 Katerina Argyraki and David R. Cheriton. 2005. Active Internet Traffic Filtering: Real-time Response to Denial-of-service Attacks. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05). USENIX Association, Berkeley, CA, USA, 10--10. http:\/\/dl.acm.org\/citation.cfm?id=1247360.1247370"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971646"},{"key":"e_1_3_2_1_3_1","volume-title":"From Comcast to Hawaiian Telcom: Tracking the top 16 residential broadband service providers in Q3","author":"Bakley Sean","year":"2017","unstructured":"Sean Bakley . 2017. From Comcast to Hawaiian Telcom: Tracking the top 16 residential broadband service providers in Q3 2017 . FierceTelecom , https:\/\/goo.gl\/otRTw2. Sean Bakley. 2017. From Comcast to Hawaiian Telcom: Tracking the top 16 residential broadband service providers in Q3 2017. FierceTelecom, https:\/\/goo.gl\/otRTw2."},{"key":"e_1_3_2_1_4_1","volume-title":"SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs\/1510.02696","author":"Basescu Cristina","year":"2015","unstructured":"Cristina Basescu , Raphael M. Reischuk , Pawel Szalachowski , Adrian Perrig , Yao Zhang , Hsu-Chun Hsiao , Ayumu Kubota , and Jumpei Urakawa . 2015 . SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs\/1510.02696 (2015). Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, and Jumpei Urakawa. 2015. SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs\/1510.02696 (2015)."},{"key":"e_1_3_2_1_5_1","volume-title":"May 01, 2017. http:\/\/www.caida.org\/data\/as-relationships\/.","author":"CAIDA.","year":"2017","unstructured":"CAIDA. 2017 . The CAIDA AS Relationships Dataset , May 01, 2017. http:\/\/www.caida.org\/data\/as-relationships\/. CAIDA. 2017. The CAIDA AS Relationships Dataset, May 01, 2017. http:\/\/www.caida.org\/data\/as-relationships\/."},{"key":"e_1_3_2_1_6_1","unstructured":"CloudFlare. 2018. CloudFlare Web page. https:\/\/www.cloudflare.com\/.  CloudFlare. 2018. CloudFlare Web page. https:\/\/www.cloudflare.com\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Rfc 5246: The transport layer security (tls) protocol. The Internet Engineering Task Force 3","author":"Dierks Tim","year":"2008","unstructured":"Tim Dierks and Eric Rescorla . 2008. Rfc 5246: The transport layer security (tls) protocol. The Internet Engineering Task Force 3 ( 2008 ). Tim Dierks and Eric Rescorla. 2008. Rfc 5246: The transport layer security (tls) protocol. The Internet Engineering Task Force 3 (2008)."},{"key":"e_1_3_2_1_8_1","volume-title":"Bohatei: Flexible and Elastic DDoS Defense. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Fayaz Seyed K.","year":"2015","unstructured":"Seyed K. Fayaz , Yoshiaki Tobioka , Vyas Sekar , and Michael Bailey . 2015 . Bohatei: Flexible and Elastic DDoS Defense. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 817--832. Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and Elastic DDoS Defense. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 817--832."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"e_1_3_2_1_11_1","unstructured":"MAWI group. 2017. MAWI Working Group Traffic Archive. http:\/\/mawi.wide.ad.jp\/mawi\/.  MAWI group. 2017. MAWI Working Group Traffic Archive. http:\/\/mawi.wide.ad.jp\/mawi\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS","author":"Ioannidis John","year":"2002","unstructured":"John Ioannidis and Steven M. Bellovin . 2002. Implementing Pushback: Router-Based Defense Against DDoS Attacks . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2002 , San Diego, California, USA. John Ioannidis and Steven M. Bellovin. 2002. Implementing Pushback: Router-Based Defense Against DDoS Attacks. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2002, San Diego, California, USA."},{"key":"e_1_3_2_1_13_1","volume-title":"AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams. CoRR abs\/1509.00268","author":"Kallitsis Michael G.","year":"2015","unstructured":"Michael G. Kallitsis , Stilian Stoev , Shrijita Bhattacharya , and George Michailidis . 2015 . AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams. CoRR abs\/1509.00268 (2015). Michael G. Kallitsis, Stilian Stoev, Shrijita Bhattacharya, and George Michailidis. 2015. AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams. CoRR abs\/1509.00268 (2015)."},{"key":"e_1_3_2_1_14_1","volume-title":"Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. In Security Protocols Workshop (Lecture Notes in Computer Science)","volume":"10368","author":"Kang Min Suk","year":"2016","unstructured":"Min Suk Kang , Virgil D. Gligor , and Vyas Sekar . 2016 . Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. In Security Protocols Workshop (Lecture Notes in Computer Science) , Vol. 10368 . Springer, 47--57. Min Suk Kang, Virgil D. Gligor, and Vyas Sekar. 2016. Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. In Security Protocols Workshop (Lecture Notes in Computer Science), Vol. 10368. Springer, 47--57."},{"key":"e_1_3_2_1_15_1","volume-title":"SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Kang Min Suk","year":"2016","unstructured":"Min Suk Kang , Virgil D. Gligor , and Vyas Sekar . 2016 . SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016 , San Diego, California, USA, February 21--24 , 2016. Min Suk Kang, Virgil D. Gligor, and Vyas Sekar. 2016. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.25"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535398"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402981"},{"key":"e_1_3_2_1_21_1","unstructured":"MANRS. 2018. MANRS for Network Operators. https:\/\/www.manrs.org\/manrs\/.  MANRS. 2018. MANRS for Network Operators. https:\/\/www.manrs.org\/manrs\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"P Marques N Sheth R Raszuk B Greene J Mauch and D McPherson. 2009. Dissemination of Flow Specification Rules. RFC 5575.  P Marques N Sheth R Raszuk B Greene J Mauch and D McPherson. 2009. Dissemination of Flow Specification Rules. RFC 5575.","DOI":"10.17487\/rfc5575"},{"key":"e_1_3_2_1_23_1","unstructured":"Andrew Mortensen Flemming Andreasen Tirumaleswar Reddy Christopher Gray Rich Compton and Nik Teague. 2018. Distributed-Denial-of-Service Open Threat Signaling (DOTS) Architecture. Internet-Draft draft-ietf-dots-architecture-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-dots-architecture-07 Work in Progress.  Andrew Mortensen Flemming Andreasen Tirumaleswar Reddy Christopher Gray Rich Compton and Nik Teague. 2018. Distributed-Denial-of-Service Open Threat Signaling (DOTS) Architecture. Internet-Draft draft-ietf-dots-architecture-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-dots-architecture-07 Work in Progress."},{"key":"e_1_3_2_1_24_1","unstructured":"360\n   .com NetLab. 2017. A quick stats on the 608 083 Mirai IPs that hit our honeypots in the past 2.5 months. https:\/\/goo.gl\/NYWMLq.  360.com NetLab. 2017. A quick stats on the 608 083 Mirai IPs that hit our honeypots in the past 2.5 months. https:\/\/goo.gl\/NYWMLq."},{"key":"e_1_3_2_1_25_1","unstructured":"Arbor Networks. 2018. DDoS Protection by Arbor Networks APS. https:\/\/www.arbornetworks.com\/ddos-protection-products\/arbor-aps.  Arbor Networks. 2018. DDoS Protection by Arbor Networks APS. https:\/\/www.arbornetworks.com\/ddos-protection-products\/arbor-aps."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"volume-title":"The SCION Architecture","author":"Perrig Adrian","key":"e_1_3_2_1_28_1","unstructured":"Adrian Perrig , Pawel Szalachowski , Raphael M. Reischuk , and Laurent Chuat . 2017. The SCION Architecture . Springer International Publishing , Cham . 17--42 pages. Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat. 2017. The SCION Architecture. Springer International Publishing, Cham. 17--42 pages."},{"key":"e_1_3_2_1_29_1","unstructured":"Steve Ranger. 2018. GitHub hit with the largest DDoS attack ever seen. ZD-Net https:\/\/goo.gl\/BmqekG.  Steve Ranger. 2018. GitHub hit with the largest DDoS attack ever seen. ZD-Net https:\/\/goo.gl\/BmqekG."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096551"},{"key":"e_1_3_2_1_31_1","unstructured":"The New York Times. 2013. How the Cyberattack on Spamhaus Unfolded. http:\/\/www.nytimes.com\/interactive\/2013\/03\/30\/technology\/how-the-cyberattack-on-spamhaus-unfolded.html.  The New York Times. 2013. How the Cyberattack on Spamhaus Unfolded. http:\/\/www.nytimes.com\/interactive\/2013\/03\/30\/technology\/how-the-cyberattack-on-spamhaus-unfolded.html."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"D. Turk. 2004. Configuring BGP to Block Denial-of-Service Attacks. RFC 3882. RFC Editor.  D. Turk. 2004. Configuring BGP to Block Denial-of-Service Attacks. RFC 3882. RFC Editor.","DOI":"10.17487\/rfc3882"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1731060.1731063"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.914506"},{"key":"e_1_3_2_1_35_1","unstructured":"Kyle York. 2016. Dyn Statement on 10\/21\/2016 DDoS Attack. https:\/\/dyn.com\/blog\/dyn-statement-on-10212016-ddos-attack\/.  Kyle York. 2016. Dyn Statement on 10\/21\/2016 DDoS Attack. https:\/\/dyn.com\/blog\/dyn-statement-on-10212016-ddos-attack\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Zenedge. 2018. Zenedge Web page. https:\/\/www.zenedge.com\/.  Zenedge. 2018. Zenedge Web page. https:\/\/www.zenedge.com\/."}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"San Juan PR USA","acronym":"ACSAC '18"},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274717","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274717"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":36,"alternative-id":["10.1145\/3274694.3274717","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274717","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}