{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:59:39Z","timestamp":1725760779152},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3360468.3368188","type":"proceedings-article","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T08:23:09Z","timestamp":1574842989000},"page":"80-81","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["ML-Pushback"],"prefix":"10.1145","author":[{"given":"Yu","family":"Mi","sequence":"first","affiliation":[{"name":"Case Western Reserve University"}]},{"given":"An","family":"Wang","sequence":"additional","affiliation":[{"name":"Case Western Reserve University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. DDoS attacks in Q2 2019 | Securelist. https:\/\/securelist.com\/ddos-report-q2-2019\/91934\/. (2019). 2019. DDoS attacks in Q2 2019 | Securelist. https:\/\/securelist.com\/ddos-report-q2-2019\/91934\/. (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"Pat Bosshart Dan Daly Glen Gibb Martin Izzard Nick McKeown Jennifer Rexford Cole Schlesinger Dan Talayco Amin Vahdat George Varghese etal 2014. P4: Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review (2014). Pat Bosshart Dan Daly Glen Gibb Martin Izzard Nick McKeown Jennifer Rexford Cole Schlesinger Dan Talayco Amin Vahdat George Varghese et al. 2014. P4: Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review (2014)."},{"volume-title":"Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM.","author":"Ion Stoica Eric Liang Xin Jin","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"John Ioannidis and Steven Michael Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. (2002). John Ioannidis and Steven Michael Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. (2002)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Nick McKeown Tom Anderson Hari Balakrishnan Guru Parulkar Larry Peterson Jennifer Rexford Scott Shenker and Jonathan Turner. 2008. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review (2008). Nick McKeown Tom Anderson Hari Balakrishnan Guru Parulkar Larry Peterson Jennifer Rexford Scott Shenker and Jonathan Turner. 2008. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review (2008).","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Ali Shiravi Hadi Shiravi Mahbod Tavallaee and Ali A Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security (2012). Ali Shiravi Hadi Shiravi Mahbod Tavallaee and Ali A Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security (2012).","DOI":"10.1016\/j.cose.2011.12.012"}],"event":{"name":"CoNEXT '19: The 15th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Orlando FL USA","acronym":"CoNEXT '19"},"container-title":["Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360468.3368188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T21:33:21Z","timestamp":1673472801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360468.3368188"}},"subtitle":["Machine Learning Based Pushback Defense Against DDoS"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":6,"alternative-id":["10.1145\/3360468.3368188","10.1145\/3360468"],"URL":"https:\/\/doi.org\/10.1145\/3360468.3368188","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}