{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:33:33Z","timestamp":1725723213524},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.23919\/cycon.2019.8756851","type":"proceedings-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:18:45Z","timestamp":1562890725000},"page":"1-15","source":"Crossref","is-referenced-by-count":3,"title":["Towards Measuring Global DDoS Attack Capacity"],"prefix":"10.23919","author":[{"given":"Arturs","family":"Lavrenovs","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Center for Applied Internet Data Analysis based at the University of California's San Diego Supercomputer Center","article-title":"State of IP Spoofing","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"ref10","first-page":"605","article-title":"ZMap: Fast Internet-wide Scanning and Its Security Applications","author":"durumeric","year":"2013","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)"},{"journal-title":"NETSCOUT Arbor Confirms 1 7 Tbps DDoS Attack The Terabit Attack Era Is Upon Us","year":"2018","author":"morales","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2017.1362020"},{"journal-title":"Technical Details behind A 400Gbps NTP Amplification DDoS Attack","year":"2014","author":"prince","key":"ref12"},{"journal-title":"NetworkScan Mon","article-title":"Scan volume per 10 minutes","year":"0","key":"ref8"},{"journal-title":"The scannings will continue until the Internet improves","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"journal-title":"DDoS Mon","article-title":"Insight into Global DDoS Threat Landscape","year":"0","key":"ref9"},{"journal-title":"Radware","article-title":"History of DDoS Attacks","year":"2017","key":"ref1"}],"event":{"name":"2019 11th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2019,5,28]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2019,5,31]]}},"container-title":["2019 11th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8751947\/8756633\/08756851.pdf?arnumber=8756851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T21:49:28Z","timestamp":1599256168000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8756851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/cycon.2019.8756851","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}