{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:27:03Z","timestamp":1737523623795,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540758525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75853-2_16","type":"book-chapter","created":{"date-parts":[[2007,11,3]],"date-time":"2007-11-03T07:18:16Z","timestamp":1194074296000},"page":"180-183","source":"Crossref","is-referenced-by-count":0,"title":["Highspeed and Flexible Source-End DDoS Protection System Using IXP2400 Network Processor"],"prefix":"10.1007","author":[{"given":"Djakhongir","family":"Siradjev","sequence":"first","affiliation":[]},{"given":"Qiao","family":"Ke","sequence":"additional","affiliation":[]},{"given":"JeongKi","family":"Park","sequence":"additional","affiliation":[]},{"given":"Young-Tak","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attacks and defense mechanisms. ACM SIGCOMM Computer Communications Review\u00a034(2), 39\u201354 (2004)","journal-title":"ACM SIGCOMM Computer Communications Review"},{"doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Change-point monitoring for detection of DoS attacks. IEEE Transactions on Dependable and Secure Computing\u00a01(4) (December 2004)","key":"16_CR2","DOI":"10.1109\/TDSC.2004.34"},{"unstructured":"Intel IXP2400 Network Processor Hardware Reference Manual, Intel Corporation (October 2004)","key":"16_CR3"},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TDSC.2005.35","volume":"2","author":"J. Mirkovic","year":"2005","unstructured":"Mirkovic, J., Reiher, P.: D-WARD: A source end defense against flooding denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing\u00a02(3), 216\u2013232 (2005)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45067-X_19","volume-title":"Information Security and Privacy","author":"T. Peng","year":"2003","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Detecting distributed denial of service attacks by sharing distributed beliefs. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Lim, B., Uddin, M.: Statistical-based SYN-flooding detection using programmable network processor. In: Proceedings of the Third International Conference on Information Technology and Applications, vol.\u00a02, pp. 465\u2013470 (2005)","key":"16_CR6","DOI":"10.1109\/ICITA.2005.262"}],"container-title":["Lecture Notes in Computer Science","IP Operations and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75853-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T02:22:49Z","timestamp":1737512569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75853-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540758525"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75853-2_16","relation":{},"subject":[]}}