{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:28:13Z","timestamp":1766068093132,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691404","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4964-4966","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster: In-switch Defense against DNS Amplification DDoS Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1019-0366","authenticated-orcid":false,"given":"Seyed Mohammad Hadi","family":"Mirsadeghi","sequence":"first","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"volume-title":"A.: 2018 State of the Internet\/Security: A Year in Review","year":"2018","key":"e_1_3_2_1_1_1","unstructured":"akamai. [n. d.]. Technologies, A.: 2018 State of the Internet\/Security: A Year in Review (2018). ([n. d.])."},{"key":"e_1_3_2_1_2_1","unstructured":"Robert Beverly and Steve Bauer. 2005. The Spoofer Project: Inferring the extent of Internet source address filtering on the internet. In Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 05)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3484266.3487370"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4248092"},{"key":"e_1_3_2_1_7_1","volume-title":"d.]. US-CERT: UDP-Based Amplification Attacks","author":"A.","year":"2018","unstructured":"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14 017A. [n. d.]. US-CERT: UDP-Based Amplification Attacks (2018). ([n. d.])."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131383"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72582-2_17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131367"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_12_1","volume-title":"Reflections on reflection (attacks). CloudFlare Blogpost","author":"Majkowski Marek","year":"2017","unstructured":"Marek Majkowski. 2017. Reflections on reflection (attacks). CloudFlare Blogpost (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_3_2_1_14_1","volume-title":"Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. arXiv preprint arXiv:2010.16061","author":"Powers David MW","year":"2020","unstructured":"David MW Powers. 2020. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. arXiv preprint arXiv:2010.16061 (2020)."},{"key":"e_1_3_2_1_15_1","unstructured":"Steve Ranger. 2018. GitHub hit with the largest DDoS attack ever seen."},{"key":"e_1_3_2_1_16_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse.. In NDSS. 1--15.","author":"Rossow Christian","year":"2014","unstructured":"Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse.. In NDSS. 1--15."},{"key":"e_1_3_2_1_17_1","volume-title":"Amplification and DRDoS attack defense--a survey and new perspectives. arXiv preprint arXiv:1505.07892","author":"Ryba Fabrice J","year":"2015","unstructured":"Fabrice J Ryba, Matthew Orlinski, Matthias W\u00e4hlisch, Christian Rossow, and Thomas C Schmidt. 2015. Amplification and DRDoS attack defense--a survey and new perspectives. arXiv preprint arXiv:1505.07892 (2015)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485385"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:08:31Z","timestamp":1755842911000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":18,"alternative-id":["10.1145\/3658644.3691404","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691404","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}