{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:04:23Z","timestamp":1766484263042,"version":"build-2065373602"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.23919\/cnsm59352.2023.10327907","type":"proceedings-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T14:04:20Z","timestamp":1701180260000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks"],"prefix":"10.23919","author":[{"given":"Benjamin","family":"Teyssier","sequence":"first","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University,Montreal,Canada"}]},{"given":"Y A","family":"Joarder","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University,Montreal,Canada"}]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University,Montreal,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.44"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet56116.2022.9955622"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487840"},{"journal-title":"Internet denial of service: Attack and defense mechanisms","year":"2004","author":"Mirkovic","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98785-5_24"},{"key":"ref7","first-page":"463","article-title":"Hell of a handshake: Abusing tcp for reflective amplification ddos attacks","volume-title":"USENIX Security Symposium","author":"Kuhrer","year":"2014"},{"journal-title":"TCP SYN Cookie Vulnerability","year":"2018","author":"Shah","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569123"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3340301.3341123"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref12","article-title":"Amplification and drdos attack defense - a survey and new perspectives","volume-title":"Tech. Rep. 1505.07892","author":"Ryba","year":"2015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9000"},{"journal-title":"Amplification and DRDoS Attack Defense - A Survey and New Perspectives","year":"2015","author":"Ryba","key":"ref14"},{"key":"ref15","article-title":"QUIC Loss Detection and Congestion Control","author":"Iyengar","year":"2021","journal-title":"Request for Comments RFC 9002, Internet Engineering Task Force"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841749"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695706"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997281"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131368"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.21"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41702-4_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8446"},{"key":"ref23","article-title":"Using TLS to Secure QUIC","author":"Thomson","year":"2021","journal-title":"Request for Comments RFC 9001, Internet Engineering Task Force"},{"key":"ref24","article-title":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","author":"Boeyen","year":"2008","journal-title":"Request for Comments RFC 5280, Internet Engineering Task Force"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3405796.3405830"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2967588"},{"journal-title":"Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments","year":"2022","author":"Mucke","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561445"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4987"},{"volume-title":"aioquic","year":"2019","author":"Laine","key":"ref32"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-34931-7_28","article-title":"Siphash: a fast short-input prf","volume-title":"Cryptology ePrint Archive, Paper 2012\/351","author":"Aumasson","year":"2012"},{"volume-title":"picoquic","year":"2019","author":"Huitema","key":"ref34"},{"volume-title":"mvfst","year":"2019","author":"Incubator","key":"ref35"},{"volume-title":"Msquic","year":"2019","key":"ref36"}],"event":{"name":"2023 19th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2023,10,30]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 19th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10327686\/10327788\/10327907.pdf?arnumber=10327907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:05:35Z","timestamp":1761066335000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10327907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":36,"URL":"https:\/\/doi.org\/10.23919\/cnsm59352.2023.10327907","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}