{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T13:49:28Z","timestamp":1698846568152},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1007\/s11227-006-8295-0","type":"journal-article","created":{"date-parts":[[2006,6,5]],"date-time":"2006-06-05T13:52:21Z","timestamp":1149515541000},"page":"235-248","source":"Crossref","is-referenced-by-count":19,"title":["A novel approach to detecting DDoS Attacks at an Early Stage"],"prefix":"10.1007","volume":"36","author":[{"given":"Bin","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yanxiang","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8295_CR1","doi-asserted-by":"crossref","unstructured":"Moore D, Voelker G, Savage S (2001) Inferring internet denial of service activity. In Proceedings of USENIX Security Symposium, Washington, DC, USA, pp 9\u201322","DOI":"10.21236\/ADA400003"},{"key":"8295_CR2","doi-asserted-by":"crossref","unstructured":"Postel J (1981) Transmission Control Protocol: DARPA internet program protocol specification, RFC 793","DOI":"10.17487\/rfc0793"},{"key":"8295_CR3","doi-asserted-by":"crossref","unstructured":"Chen Y (2000) Study on the prevention of SYN flooding by using traffic policing. In: Network Operations and Management Symposium 2000 IEEE\/IFIP, pp 593\u2013604","DOI":"10.1109\/NOMS.2000.830416"},{"key":"8295_CR4","first-page":"1530","volume":"3","author":"H Wang","year":"2002","unstructured":"Wang H, Zhang D, Shin KG (2002) Detecting SYN flooding attacks. In: Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM), vol. 3, pp 1530\u20131539","journal-title":"Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM)"},{"key":"8295_CR5","doi-asserted-by":"crossref","unstructured":"Jin C, Wang HN, Shin KG (2003) Hop-count filtering: An effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, pp 30\u201341","DOI":"10.1145\/948109.948116"},{"key":"8295_CR6","first-page":"99","volume-title":"In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)","author":"A Hussain","year":"2003","unstructured":"Hussain A, Heidemann J, Papadopoulos C (2003) Denial-of-service: A framework for classifying denial of service attacks. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), Karlsruhe, Germany, pp 99\u2013110"},{"key":"8295_CR7","first-page":"61","volume":"32","author":"A Keromytis","year":"2002","unstructured":"Keromytis A, Misra V, Rubenstein D (2002) SOS: Secure overlay services. In: ACM SIGCOMM Computer Communication Review, Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, vol. 32, pp 61\u201372","journal-title":"ACM SIGCOMM Computer Communication Review, Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA"},{"key":"8295_CR8","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/JSAC.2003.818807","volume":"22","author":"A Keromytis","year":"2004","unstructured":"Keromytis A, Misra V, Rubenstein, D (2004) SOS: An architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22:176\u2013188","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8295_CR9","unstructured":"Stavrou A, Keromytis AD, Nieh J, Misra V, Rubenstein D (2005) MOVE: An End-to-End solution to network denial of service. In: Proceedings of the 12th Symposium on Network and Distributed System Security (NDSS)"},{"key":"8295_CR10","doi-asserted-by":"crossref","unstructured":"Morein WG, Stavrou A, Cook DL, Keromytis AD, Misra V, Rubenstein D, (2003) DOS protection: Using graphic turing tests to counter automated DDoS attacks against web servers. In: Proceedings of the 10th ACM Conference on Computer and Communications Security,Washington, DC, USA, pp 8\u201319","DOI":"10.1145\/948109.948114"},{"key":"8295_CR11","doi-asserted-by":"crossref","unstructured":"XiaoFeng Wang MKR (2004) Mitigating bandwidth-exhaustion attacks using congestion puzzles. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS\u201904), Washington DC, USA, pp 257\u2013267","DOI":"10.1145\/1030083.1030118"},{"key":"8295_CR12","doi-asserted-by":"crossref","unstructured":"Waters B, Juels A, Halderman JA, Felten EW (2004) New client puzzle outsourcing techniques for DoS resistance. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS\u201904), Washington DC, USA, pp 246\u2013256","DOI":"10.1145\/1030083.1030117"},{"key":"8295_CR13","doi-asserted-by":"crossref","unstructured":"Mirkovic J, Prier G (2002) Attacking DDoS at the source. In In: 10th Proceedings of the IEEE International Conference on Network Protocols, Paris, France, pp 312\u2013321","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"8295_CR14","doi-asserted-by":"crossref","unstructured":"Ferguso P, Senie D (2000) Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","DOI":"10.17487\/rfc2827"},{"key":"8295_CR15","unstructured":"Song DX, Perrig A (2001) Advanced and authenticated marking schemes for IP traceback. In: Proceeding of Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp 878\u2013886"},{"key":"8295_CR16","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1109\/TPDS.2003.1233709","volume":"14","author":"M Sung","year":"2003","unstructured":"Sung M, Xu J (2003) IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks. IEEE Transactions on Parallel and Distributed Systems 14:861\u2013872","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"8295_CR17","doi-asserted-by":"crossref","unstructured":"Snoeren AC (2001) Hash-based IP traceback. In: Proceedings of the ACM SIGCOMM Conference, ACM Press, pp 3\u201314","DOI":"10.1145\/383059.383060"},{"key":"8295_CR18","unstructured":"Bellovin SM (2000) ICMP traceback messages. Technical report"},{"key":"8295_CR19","unstructured":"Ioannidis J, Bellovin SM (2002) Implementing pushback: Router-based defense against DDoS attacks. In: Proceedings of Network and Distributed System Security Symposium (NDSS), Catamaran Resort Hotel San Diego, California, The Internet Society"},{"key":"8295_CR20","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space time trade-offs in hash coding with allowable errors. Communications of the ACM 13:422\u2013426","journal-title":"Communications of the ACM"},{"key":"8295_CR21","doi-asserted-by":"crossref","first-page":"1353","DOI":"10.1109\/GLOCOM.2003.1258459","volume":"3","author":"S Abdelsayed","year":"2003","unstructured":"Abdelsayed S, Glimsholt D, Leckie C, Ryan S, Shami S (2003) An efficient filter for denial-of-service bandwidth attacks. In: IEEE Global Telecommunications Conference (GLOBECOM\u201903), vol. 3, pp 1353\u20131357","journal-title":"IEEE Global Telecommunications Conference (GLOBECOM\u201903)"},{"key":"8295_CR22","doi-asserted-by":"crossref","unstructured":"Chan E, Chan H, Chan K, Chan V, Chanson S (2004) IDR: An intrusion detection router for defending against distributed denial-of-service(DDoS) attacks. In: Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks 2004 (ISPAN\u201904), pp 581\u2013586","DOI":"10.1109\/ISPAN.2004.1300541"},{"key":"8295_CR23","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"RK Chang","year":"2002","unstructured":"Chang RK (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. Communications Magazine, IEEE 40:42\u201351","journal-title":"Communications Magazine, IEEE"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-006-8295-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-006-8295-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-006-8295-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T00:08:55Z","timestamp":1627430935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-006-8295-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["8295"],"URL":"https:\/\/doi.org\/10.1007\/s11227-006-8295-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}