{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:12:59Z","timestamp":1725574379054},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540230342"},{"type":"electronic","value":"9783540259787"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25978-7_88","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T20:45:17Z","timestamp":1294519517000},"page":"877-885","source":"Crossref","is-referenced-by-count":0,"title":["Design of Traceback System Using Selected Router"],"prefix":"10.1007","author":[{"given":"Jeong Min","family":"Lee","sequence":"first","affiliation":[]},{"given":"In Gu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Kyoon Ha","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"88_CR1","unstructured":"Computer Emergency Response Team (CERT), CERT Advisory CA-2000- 01 Denial-of-Service developments (January 2000), \n                    \n                      http:\/\/www.cert.org\/advisories\/CA-2000-01.html"},{"key":"88_CR2","unstructured":"Computer Emergency Response Team (CERT), CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks (November 29, 2000), \n                    \n                      http:\/\/www.cert.org\/advisories\/CA-1996-21.html"},{"key":"88_CR3","unstructured":"Computer Emergency Response Team (CERT), CERT Advisory CA-2003-04 MS-SQL Server Worm (January 27, 2003), \n                    \n                      http:\/\/www.cert.org\/advisories\/CA-2003-04.html"},{"key":"88_CR4","first-page":"36","volume-title":"Unix System Security","author":"D.A. Curry","year":"1992","unstructured":"Curry, D.A.: Unix System Security, pp. 36\u201380. Addison-Wesley, Reading (1992)"},{"key":"88_CR5","unstructured":"Stone, R.: CenterTrack: An IP Overlay Network for Tracking DoS Floods. In: To appear in Proceedings of the 2000 USENIX Security Symposium, Denver, CO (July 2000)"},{"key":"88_CR6","unstructured":"Dellovin, S.M.: The ICMP Traceback Messages, Internet Draft: draft-bellovinitrace-00.txt (March 2000), \n                    \n                      http:\/\/www.research.att.com\/~smb"},{"key":"88_CR7","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proc. of ACM SIGCOMM, 295\u2013306 (August 2000)","DOI":"10.1145\/347059.347560"},{"key":"88_CR8","unstructured":"Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. IEEE INFOCOM (April 2001)"},{"key":"88_CR9","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1966","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, 2nd edn., vol.\u00a01. Wiley and Sons, Chichester (1966)","edition":"2"},{"key":"88_CR10","doi-asserted-by":"crossref","unstructured":"Carter, R.L., Crovellam, M.E.: Dynamic Server Selection Using Dynamic Path Characterization in Wide-Area Networks. In: Proc. of the 1997 IEEE INFOCOM, Kobe, Japan (April 1997)","DOI":"10.1109\/INFCOM.1997.631117"},{"key":"88_CR11","doi-asserted-by":"crossref","unstructured":"Theilmann, W., Rothermel, K.: Dynamic Distance Maps of the Internet. In: Proc. 2000 IEEE INFOCOM, Tel Aviv, Israel (March 2000)","DOI":"10.1109\/INFCOM.2000.832197"},{"key":"88_CR12","unstructured":"Cooperative Association for Internet Data Analysis. Skitter Analysis (2000), \n                    \n                      http:\/\/www.caida.org"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Networking Technologies for Broadband and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25978-7_88.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:21:05Z","timestamp":1620012065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25978-7_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540230342","9783540259787"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25978-7_88","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}