{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:52Z","timestamp":1725490612229},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001645"},{"type":"electronic","value":"9783540361596"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36159-6_4","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T10:06:48Z","timestamp":1188295608000},"page":"37-48","source":"Crossref","is-referenced-by-count":15,"title":["An Evaluation of Different IP Traceback Approaches"],"prefix":"10.1007","author":[{"given":"Vadim","family":"Kuznetsov","sequence":"first","affiliation":[]},{"given":"Helena","family":"Sandstr\u00f6m","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Simkin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,16]]},"reference":[{"key":"4_CR1","first-page":"239","volume-title":"Proc. of the 2001 Workshop on Information Assurance and Security","author":"S. Lee","year":"2001","unstructured":"S. Lee and C. Shields, \u201cTracing the Source of Network Attack: A Technical, Legal and Societal Problem\u201d, Proc. of the 2001 Workshop on Information Assurance and Security, June 2001, United States Military Academy, West Point, NY, pp 239\u2013246, http:\/\/www.research.att.lists\/ietfitrace\/2000\/09\/msg00044.htm"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/347057.347560","volume":"30","author":"S. Savage","year":"2000","unstructured":"Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, \u201cPractical Network Support for IP Traceback\u201d, Proc. of the ACM SIGCOMM conference, August 2000, Stockholm, Sweden, Computer Communication Review Vol. 30, No 4, October 2000, pp. 295\u2013306, http:\/\/www.es.washington.edu\/homes\/savage\/papers\/SigcommOO.ps","journal-title":"Computer Communication Review"},{"unstructured":"Dawn X. Song and Adrian Perrig, \u201cAdvanced and Authenticated Marking Schemes for IP Traceback\u201d, Proc. of the IEEE infocom conference, april 2001, Anchorage, Alaska, http:\/\/paris.cs.berkeley.edu\/~perrig\/projects\/iptraceback\/tr-iptrace.pdf","key":"4_CR3"},{"doi-asserted-by":"crossref","unstructured":"David Moore, Geoffrey M. Voelker and Stefan Savage, \u201cInferring Internet Denial-of-Service Activity\u201d, Proc of the 10th USENIX Security Symposium, August 2001, Washington D.C., http:\/\/www.caida.org\/outreach\/papers\/2001\/BackScatter\/usenixsecurity01.pdf","key":"4_CR4","DOI":"10.21236\/ADA400003"},{"unstructured":"Steven M. Bellovin, \u201cICMP Traceback Messages\u201d, Internet Draft: draft-bellovin-itrace-00.txt, submitted Mar. 2000, expiration date Sep. 2000, http:\/\/www.research,att.com\/~smb\/papers\/draft-bellovin-itrace-0 0.txt","key":"4_CR5"},{"unstructured":"S. Felix Wu, Lixia Zhang, Dan Massey, Allison Mankin, \u201cIntention-Driven ICMP Trace-back\u201d, Internet Draft: draft-wu-itrace-intention-00.txt, submission date Feb. 2001, expiration date Aug. 2001, http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-itrace-intention-00.txt","key":"4_CR6"},{"unstructured":"Allison Mankin, Dan Massey, Chien-Long Wu, S. Felix Wu, Lixia Zhang, \u201cOn Design and Evaluation of Intention-Driven ICMP Traceback\u201d, Proc. of 10th IEEE International Conference on Computer Communications and Networks, Oct.2001, Scotsdale Arizona, http:\/\/irl.cs.ucla.edu\/papers\/Intention-iTrace.pdf","key":"4_CR7"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/964723.383060","volume":"31","author":"A. Snoeren","year":"2001","unstructured":"Alex Snoeren et al., \u201cHash-Based IP Traceback\u201d, Proc. of the ACM SIGCOMM conference \u20222001, San Diego, CA, Computer Communication Review Vol. 31, No 4, October 2001, pp. 3\u201314, http:\/\/nms.lcs.mit.edu\/~snoeren\/papers\/spie-sigcomm.pdf","journal-title":"Computer Communication Review"},{"unstructured":"Drew Dean, Matt Franklin, Adam Stubblefield, \u201cAn Algebraic Approach to IP Trace-back\u201d, Xerox PARC, Rice University, August 2000, http:\/\/www.cs.rice.edu\/~astubble\/algtrace.pdf","key":"4_CR9"},{"unstructured":"The Network Simulator-ns-2, http:\/\/www.isi.edu\/nsnam\/ns","key":"4_CR10"},{"doi-asserted-by":"crossref","unstructured":"Vern Paxson, \u201cAn Analysis of Using Reflectors for Distributed Denial-of-Service Attacks\u201d, ACM SIGCOMM Computer Communication Review Vol. 31, No 3, July 2001, http:\/\/www.acm.org\/sigcomm\/ccr\/archive\/2001\/jul01\/ccr-200107-paxson.pdf","key":"4_CR11","DOI":"10.1145\/505659.505664"},{"unstructured":"Robert Stone, \u201cCenterTrack: An IP Overlay Network for Tracking DoS Floods\u201d, Proceedings of the 9th USENIX Security Symposium, Aug 2000, http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec2000\/full_papers\/stone\/stone.pdf","key":"4_CR12"},{"doi-asserted-by":"crossref","unstructured":"P. Fergusson and D. Seine, \u201cNetwork Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing\u201d, RFC2827, May 2000, http:\/\/www.ietf.org\/rfc\/rfc2827.txt","key":"4_CR13","DOI":"10.17487\/rfc2827"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36159-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:06:52Z","timestamp":1556802412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36159-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001645","9783540361596"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36159-6_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}