{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:18:15Z","timestamp":1729631895404,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/lanman.2015.7114724","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T15:22:05Z","timestamp":1433344925000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Superpoint-based detection against distributed denial of service (DDoS) flooding attacks"],"prefix":"10.1109","author":[{"given":"Hong","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Shuqiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hongchao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Mingming","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"journal-title":"DDoS Attack 2007” dataset","article-title":"The Cooperative Association for Internet Data Analysis, The CAIDA UCSD","year":"0","key":"ref32"},{"journal-title":"Passive Measurement and Analysis (PMA) Project “Auckland-VIII” dataset","article-title":"The National Laboratory for Applied Network Research (NLANR)","year":"0","key":"ref31"},{"journal-title":"MAWI Working Group Traffic Archive WIDE Measurement and Analysis on the WIDE Intemet Working Group","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.04.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.262"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.191"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1016\/j.jpdc.2006.04.007","article-title":"Collaborative detection and filtering of shrew DDoS attacks using spectral analysis","volume":"66","author":"chen","year":"2006","journal-title":"J Parallel Distributed Computing"},{"key":"ref18","first-page":"287","article-title":"Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds","author":"kandula","year":"2005","journal-title":"Proc 2nd Symposium Networked Syst Design and Implementation (NSDI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2187441"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/49.464717"},{"volume":"ix","journal-title":"WorldWide Infrastructure Security Report","year":"2014","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0511-2"},{"volume":"vi","journal-title":"WorldWide Infrastructure Security Report","year":"2011","key":"ref3"},{"key":"ref6","first-page":"9","article-title":"Source-based filtering algorithm against DDoS attacks","volume":"1","author":"yi","year":"2008","journal-title":"International Journal of Database Theory and Application"},{"journal-title":"DARPA Intrusion Detection Scenario-Specific Data Set (Lincoln Laboratory Scenario 1 0)","article-title":"MIT Lincoln Laboratory","year":"2000","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70224"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1016\/j.jpdc.2006.04.007","article-title":"Collaborative detection and filtering of shrew ddos attacks using spectral analysis","volume":"66","author":"chen","year":"2006","journal-title":"Journal of Parallel Distributed Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","article-title":"Denial-of-service attack-detection techniques","volume":"10","author":"carl","year":"2006","journal-title":"IEEE Internet Computing"},{"key":"ref1","article-title":"Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319","author":"criscuolo","year":"2000","journal-title":"Department of Energy Computer Incident Advisory Capability (CIAC) UCRL-ID-136939 Rev 1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923716"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115504"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.10.012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426267"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70786"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-008-0158-2"},{"key":"ref25","article-title":"New streaming algorithms for fast detection of superspreaders","volume":"6","author":"venkataraman","year":"0","journal-title":"Department of Electrical and Computing Engineering Paper"}],"event":{"name":"2015 IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN)","start":{"date-parts":[[2015,4,22]]},"location":"Beijing, China","end":{"date-parts":[[2015,4,24]]}},"container-title":["The 21st IEEE International Workshop on Local and Metropolitan Area Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7113431\/7114713\/07114724.pdf?arnumber=7114724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T22:19:25Z","timestamp":1566771565000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7114724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/lanman.2015.7114724","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}