{"id":"https://openalex.org/W2489329677","doi":"https://doi.org/10.1007/978-3-319-39814-3_16","title":"Anycast and Its Potential for DDoS Mitigation","display_name":"Anycast and Its Potential for DDoS Mitigation","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2489329677","doi":"https://doi.org/10.1007/978-3-319-39814-3_16","mag":"2489329677"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-39814-3_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-39814-3_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01632736","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011979332","display_name":"Wouter B. de Vries","orcid":"https://orcid.org/0000-0001-6592-0914"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Wouter B. de Vries","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111930228","display_name":"Ricardo de O. Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ricardo de O. Schmidt","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["University of Twente, Enschede, Overijssel, The Netherlands","University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Overijssel, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011979332"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":1.917,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.85309491,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"147","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anycast","display_name":"Anycast","score":0.9850672483444214},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9207247495651245},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7544140815734863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6793982982635498},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6126111745834351},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.5556426644325256},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5150887370109558},{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.46037301421165466},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4372902512550354},{"id":"https://openalex.org/keywords/globe","display_name":"Globe","score":0.43718981742858887},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.12279075384140015},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11980897188186646},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1086498498916626},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08268052339553833}],"concepts":[{"id":"https://openalex.org/C122005561","wikidata":"https://www.wikidata.org/wiki/Q613897","display_name":"Anycast","level":3,"score":0.9850672483444214},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9207247495651245},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7544140815734863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6793982982635498},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6126111745834351},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.5556426644325256},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5150887370109558},{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.46037301421165466},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4372902512550354},{"id":"https://openalex.org/C2775899829","wikidata":"https://www.wikidata.org/wiki/Q3109007","display_name":"Globe","level":2,"score":0.43718981742858887},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.12279075384140015},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11980897188186646},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1086498498916626},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08268052339553833},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C118487528","wikidata":"https://www.wikidata.org/wiki/Q161437","display_name":"Ophthalmology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-39814-3_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-39814-3_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/ce709b8d-17a1-4d2b-afe9-9ef3ea70da52","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/ce709b8d-17a1-4d2b-afe9-9ef3ea70da52","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"de Vries, W B, de Oliveira Schmidt, R & Pras, A 2016, Anycast and its potential for DDoS mitigation. in Management and Security in the Age of Hyperconnectivity. Proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016. Lecture Notes in Computer Science, vol. 9701, Springer, Switzerland, pp. 147-151, 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016, Munich, Germany, 20/06/16. https://doi.org/10.1007/978-3-319-39814-3_16","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01632736v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01632736","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.147-151, &#x27E8;10.1007/978-3-319-39814-3_16&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01632736v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01632736","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.147-151, &#x27E8;10.1007/978-3-319-39814-3_16&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W157634311","https://openalex.org/W1993906333","https://openalex.org/W2055241621","https://openalex.org/W2170122011","https://openalex.org/W2171839243","https://openalex.org/W3009158403","https://openalex.org/W6791623585"],"related_works":["https://openalex.org/W2170470865","https://openalex.org/W2167302331","https://openalex.org/W2762968876","https://openalex.org/W2127772962","https://openalex.org/W1493760256","https://openalex.org/W2359167911","https://openalex.org/W2342208107","https://openalex.org/W2151002785","https://openalex.org/W2353701916","https://openalex.org/W2199179552"],"abstract_inverted_index":{"IP":[0,44,87],"anycast":[1,45,88],"is":[2,25],"widely":[3],"being":[4],"used":[5,49],"to":[6,26,50,59,68,72,96],"distribute":[7],"essential":[8],"Internet":[9],"services,":[10],"such":[11],"as":[12],"DNS,":[13],"across":[14],"the":[15,19,28,31,35,38,56,65,98],"globe.":[16],"One":[17],"of":[18,30,37,41,75,100],"main":[20],"reasons":[21],"for":[22],"doing":[23],"so":[24],"increase":[27],"redundancy":[29],"service":[32,67],"and":[33,94],"reduce":[34],"impacts":[36],"growing":[39],"threat":[40],"DDoS":[42,52,101],"attacks.":[43,102],"can":[46,89],"be":[47,90],"further":[48],"mitigate":[51],"attacks":[53],"by":[54],"confining":[55],"attack":[57],"traffic":[58],"certain":[60],"areas.":[61],"This":[62],"might":[63],"cause":[64],"targeted":[66],"become":[69],"unavailable":[70],"only":[71],"a":[73],"fraction":[74],"its":[76],"users.":[77],"In":[78],"this":[79],"PhD":[80],"research":[81],"we":[82],"aim":[83],"at":[84],"investigating":[85],"how":[86],"optimized":[91],"both":[92],"statically":[93],"dynamically":[95],"support":[97],"mitigation":[99]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
