{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:27Z","timestamp":1750220727667,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,10]]},"DOI":"10.1145\/3405837.3411375","type":"proceedings-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T21:50:56Z","timestamp":1631656256000},"page":"18-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["In-network defense against AR-DDoS attacks"],"prefix":"10.1145","author":[{"given":"Xin Zhe","family":"Khooi","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Levente","family":"Csikor","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Min Suk","family":"Kang","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[{"name":"Trustwave"}]}],"member":"320","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"volume-title":"DDos Weapons Intelligence Map. https:\/\/threats.a10networks.com\/ [Accessed","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"A10 Networks. [n.d.]. DDos Weapons Intelligence Map. https:\/\/threats.a10networks.com\/ [Accessed: Jun 2020]."},{"volume-title":"Why Akamai Cloud Security for DDoS Protection? Online. https:\/\/www.akamai.com\/us\/en\/products\/security\/ddos-protection-service.jsp [Accessed","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"Akamai. [n.d.]. Why Akamai Cloud Security for DDoS Protection? Online. https:\/\/www.akamai.com\/us\/en\/products\/security\/ddos-protection-service.jsp [Accessed: Jul 2020]."},{"key":"e_1_3_2_1_3_1","volume-title":"Performance of bmv2. GitHub, https:\/\/github.com\/p4lang\/behavioral-model\/blob\/master\/docs\/performance.md [Accessed","author":"Bas Antonin","year":"2020","unstructured":"Antonin Bas. [n.d.]. Performance of bmv2. GitHub, https:\/\/github.com\/p4lang\/behavioral-model\/blob\/master\/docs\/performance.md [Accessed: Jun 2020]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_5_1","volume-title":"AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever. ZDNet, https:\/\/zd.net\/3hZ06oF [Accessed","author":"Cimpanu Catalin","year":"2020","unstructured":"Catalin Cimpanu. Jun 2020. AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever. ZDNet, https:\/\/zd.net\/3hZ06oF [Accessed: Jun 2020]."},{"volume-title":"DNS Amplification DDoS Attack. Blog post, https:\/\/bit.ly\/31dgJXN [Accessed","year":"2020","key":"e_1_3_2_1_6_1","unstructured":"Cloudflare. [n.d.]. DNS Amplification DDoS Attack. Blog post, https:\/\/bit.ly\/31dgJXN [Accessed: Jun 2020]."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","author":"Fayaz Seyed K.","year":"2015","unstructured":"Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and Elastic DDoS Defense. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). 817--832."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"e_1_3_2_1_10_1","volume-title":"DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks. In 2020 IEEE Conference on Network Softwarization (NetSoft).","author":"Khooi Xin Zhe","year":"2020","unstructured":"Xin Zhe Khooi, Levente Csikor, Dinil Mon Divakaran, and Min Suk Kang. 2020. DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks. In 2020 IEEE Conference on Network Softwarization (NetSoft)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405837.3411402"},{"key":"e_1_3_2_1_12_1","unstructured":"Lily Hay Newman. Jan 2018. GitHub Survived the Biggest DDoS Attack Ever Recorded. Wired https:\/\/www.wired.com\/story\/github-ddos-memcached\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Nick Martin. May 2014. Overprovisioning VMs may be safe but it isn't sound. Blog post https:\/\/bit.ly\/37oCELJ."},{"key":"e_1_3_2_1_14_1","volume-title":"NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack. NETSCOUT blog, https:\/\/www.netscout.com\/blog\/asert\/netscout-arbor-confirms-17-tbps-ddos-attack-terabit-attack-era [Accessed","author":"Morales Carlos","year":"2020","unstructured":"Carlos Morales. Mar 2018. NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack. NETSCOUT blog, https:\/\/www.netscout.com\/blog\/asert\/netscout-arbor-confirms-17-tbps-ddos-attack-terabit-attack-era [Accessed: Jun 2020]."},{"key":"e_1_3_2_1_15_1","volume-title":"Arbor Cloud DDoS Protection Services. Online. https:\/\/www.netscout.com\/product\/arbor-cloud [Accessed","author":"NETSCOUT.","year":"2020","unstructured":"NETSCOUT. [n.d.]. Arbor Cloud DDoS Protection Services. Online. https:\/\/www.netscout.com\/product\/arbor-cloud [Accessed: Jul 2020]."},{"volume-title":"The BMv2 Simple Switch target. GitHub, https:\/\/github.com\/p4lang\/behavioral-model\/blob\/master\/docs\/simple_switch.md [Accessed","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"p4lang. [n.d.]. The BMv2 Simple Switch target. GitHub, https:\/\/github.com\/p4lang\/behavioral-model\/blob\/master\/docs\/simple_switch.md [Accessed: Jun 2020]."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_2_1_18_1","volume-title":"DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet [Accessed","author":"Woolf Nicky","year":"2020","unstructured":"Nicky Woolf. Oct 2016. DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet [Accessed: Jun 2020]."}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual event","acronym":"SIGCOMM '20"},"container-title":["Proceedings of the SIGCOMM '20 Poster and Demo Sessions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405837.3411375","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3405837.3411375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405837.3411375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,10]]},"references-count":18,"alternative-id":["10.1145\/3405837.3411375","10.1145\/3405837"],"URL":"https:\/\/doi.org\/10.1145\/3405837.3411375","relation":{},"subject":[],"published":{"date-parts":[[2020,8,10]]},"assertion":[{"value":"2021-09-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}