{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T01:10:01Z","timestamp":1736557801000,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457763"},{"type":"electronic","value":"9783540462330"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11876601_27","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T14:46:45Z","timestamp":1159282005000},"page":"263-272","source":"Crossref","is-referenced-by-count":2,"title":["Tracing the True Source of an IPv6 Datagram Using Policy Based Management System"],"prefix":"10.1007","author":[{"given":"Syed Obaid","family":"Amin","sequence":"first","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Ki Young","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Belenky, A., Ansari, N.: On IP Traceback. IEEE Communications Magazine\u00a041(7) (July 2003)","DOI":"10.1109\/MCOM.2003.1215651"},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S. Savage","year":"2001","unstructured":"Savage, S., et al.: Network Support for IP Traceback. IEEE\/ACM Trans. Net.\u00a09(3), 226\u2013237 (2001)","journal-title":"IEEE\/ACM Trans. Net."},{"key":"27_CR3","unstructured":"Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings IEEE Infocomm 2001 (April 2001)"},{"key":"27_CR4","unstructured":"Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, Tech. Rep. CSD-00-013, Department of Computer Sciences, Purdue University (June 2000)"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Schwartz, B., Kent, S., Strayer, W.: Single-packet IP traceback. ACM\/IEEE Transactions on Networking (December 2002)","DOI":"10.1109\/TNET.2002.804827"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSECP.2003.1203219","volume":"1","author":"H. Aljifri","year":"2003","unstructured":"Aljifri, H.: IP traceback: a new denial-of-service deterrent. Security & Privacy Magazine\u00a01(3), 24\u201331 (2003)","journal-title":"Security & Privacy Magazine"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Waldvogel, M.: GOSSIB vs. IP Traceback Rumors. In: 18th Annual Computer Security Applications Conference (ACSAC 2002) (2002)","DOI":"10.1109\/CSAC.2002.1176273"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Strayer, W.T., Jones, C.E., Tchakountio, F., Hain, R.R.: SPIE-IPv6: Single IPv6 Packet Traceback. In: 29th Annual IEEE International Conference on Local Computer Networks, 2004, November 16-18, pp. 118\u2013125 (2004)","DOI":"10.1109\/LCN.2004.118"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Adler, M.: Tradeoffs in probabilistic packet marking for IP traceback. In: Proceedings of 34th ACM Symposium on Theory of Computing (STOC) (2002)","DOI":"10.1145\/509907.509969"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Belenky, A., Ansari, N.: On IP traceback. IEEE Communications Magazine\u00a041(7) (July 2003)","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Hong, C.S., Park, P.Y., Jiang, W.: DDoS Attack Defense Architecture Using Statistical Mechanism on Active Network Environment. Applied Cryptography and Network Security, 47\u201356 (June 2004)","DOI":"10.1007\/978-3-540-24707-4_104"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Westerinen, A., et al.: Terminology for Policy-Based Management, RFC3198, IETF (November 2001)","DOI":"10.17487\/rfc3198"},{"key":"27_CR13","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Intrusion-detection_system"},{"key":"27_CR14","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Intrusion_prevention_system"},{"key":"27_CR15","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Firewall_%28networking%29"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification, RFC 2460, IETF (December 1998)","DOI":"10.17487\/rfc2460"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/11807964_68","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"S.O. Amin","year":"2006","unstructured":"Amin, S.O., Kang, M.S., Hong, C.S.: A Lightweight IP Traceback Mechanism on IPv6. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol.\u00a04097, pp. 671\u2013680. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Management of Convergence Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11876601_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:55:46Z","timestamp":1736556946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11876601_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457763","9783540462330"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11876601_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}