{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:09:17Z","timestamp":1725516557429},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692928"},{"type":"electronic","value":"9783540692935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69293-5_34","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"426-438","source":"Crossref","is-referenced-by-count":1,"title":["IP Traceback Using Digital Watermark and Honeypot"],"prefix":"10.1007","author":[{"given":"Zaiyao","family":"Yi","sequence":"first","affiliation":[]},{"given":"Liuqing","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xinmei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Benxiong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Stone, R.: An IP Overlay Network for Tracking DoS Floods. In: Proceedings of the 9th Usenix Security Symposium, Denver, CO, USA (2000)"},{"key":"34_CR2","unstructured":"Burch, H., Cheswick, B.: Tracing Anonymous Packets to their Approximate Source. In: Proceedings of the 14th Conference on Systems Administration, New Orleans, Louisiana, USA. LISA XIV (2000)"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2827, IETF, Network Working Group, Category: Best Current Practice (May 2000)","DOI":"10.17487\/rfc2827"},{"key":"34_CR4","unstructured":"Bellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages. Internet Draft, IETF (October 2001)"},{"key":"34_CR5","unstructured":"Wu, S.F., Zhang, L., Massey, D., Mankin, A.: Intention-Driven ICMP Traceback. Internet Draft, IETF (February 2001)"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing, 20\u201326 (March\/April, 2002)","DOI":"10.1109\/4236.991439"},{"key":"34_CR7","unstructured":"Schnackenberg, D., Djahandari, K., Sterne, D.: Infrastructure for Intrusion Detection and Response. In: Proceedings for DISCEX (January 2000)"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Schnackenberg, D., Djahandari, K., Sterne, D., Holiday, H., Smith, R.: Cooperative Intrusion Traceback and Response Architecture (CITRA). In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (June 2001)","DOI":"10.1109\/DISCEX.2001.932192"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakoutio, F., Kent, S.T., Strayer, S.T.: Hash-Based IP Traceback. In: Proceedings of ACM SIGCOMM 2001 (August 2001)","DOI":"10.1145\/383059.383060"},{"key":"34_CR10","unstructured":"Burch, H., Cheswick, B.: Tracing Anonymous Packets to their Approximate Source. In: Proceedings of the 14th Conference on Systems Administration, 2000 LISA XIV, New Orleans, Louisiana, USA (2000)"},{"issue":"3","key":"34_CR11","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S. Savage","year":"2001","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP Traceback. IEEE\/ACM Transactions on Networking\u00a09(3), 226\u2013237 (2001)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"34_CR12","unstructured":"Song, D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proceedings of the IEEE INFOCOM 2001, Anchorage, AK, USA (2001)"},{"key":"34_CR13","unstructured":"Lee, W., Park, K.: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack. In: Proceedings of the IEEE INFOCOM 2001, Anchorage, AK, USA (2001)"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/505586.505588","volume":"5","author":"D. Dean","year":"2002","unstructured":"Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Transactions on Information and System Security\u00a05, 119\u2013137 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"34_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_19","volume-title":"Information Hiding","author":"J.P. Stern","year":"2001","unstructured":"Stern, J.P., Tillich, J.-P.: Automatic\u00a0Detection\u00a0of\u00a0a\u00a0Watermarked\u00a0 \u00a0\u00a0 Document\u00a0Using\u00a0a\u00a0Private\u00a0Key. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, Springer, Berlin (2001)"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Wang, X.Y., Chen, S.: Network\u00a0Flow\u00a0Watermarking\u00a0Attack\u00a0on\u00a0Low-Latency\u00a0Anonymous\u00a0Communication\u00a0Systems. In: Proc.\u00a0of\u00a0the\u00a02007\u00a0IEEE\u00a0Symposium\u00a0on\u00a0Security\u00a0and\u00a0Privacy, Oakland, \u00a0May\u00a0(2007)","DOI":"10.1109\/SP.2007.30"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Pyun, Y.J., Park, Y.H., Wang, X.Y., Reeves, D.S., Ning, P.: Tracing\u00a0Traffic\u00a0Through\u00a0Intermediate\u00a0Hosts\u00a0that\u00a0Repacketize\u00a0Flows. In: Proc.\u00a0of\u00a0the\u00a026th\u00a0Annual\u00a0IEEE\u00a0Conf.\u00a0on\u00a0Computer\u00a0Communications\u00a0(Infocom\u00a02007) (2007)","DOI":"10.1109\/INFCOM.2007.80"},{"key":"34_CR18","unstructured":"Park, Y.H., Reeves, D.S.: Adaptive\u00a0Watermarking\u00a0Against\u00a0Deliberate\u00a0Random\u00a0Delay\u00a0for\u00a0Attack\u00a0Attribution\u00a0Through\u00a0Stepping\u00a0Stones. In: Proc.\u00a0of\u00a0the\u00a0Ninth\u00a0International\u00a0Conference\u00a0on\u00a0Information\u00a0and\u00a0Communications\u00a0Security\u00a0(ICICS\u00a02007) (2007)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69293-5_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:57:00Z","timestamp":1605761820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69293-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692928","9783540692935"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69293-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}