{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:29:49Z","timestamp":1725564589399},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_42","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"292-296","source":"Crossref","is-referenced-by-count":1,"title":["Identifying the Attack Source by IP Traceback"],"prefix":"10.1007","author":[{"given":"K. C.","family":"Nalavade","sequence":"first","affiliation":[]},{"given":"B. B.","family":"Meshram","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Nalavade, K.C., Meshram, B.B.: Intrusion Prevention System: Data Miniining Approach. In: International Conference and Workshop on Emerging Trends in Technology, Mumbai (2010)","DOI":"10.1145\/1741906.1741952"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Duan, Z., Yuan, X., Chandrashekhsr, J.: Controlling IP spoofing through Interdomain Packet Filters. IEEE Transactions on Dependable and secure computing\u00a05(1) (January-March 2008)","DOI":"10.1109\/TDSC.2007.70224"},{"key":"42_CR3","unstructured":"Beverly, R., Bauer, S.: The spoofer project: Inferring the Extent of Internet Source Address Filtering on the Internet. In: Proc. First Usenix Steps to reducing Unwanted Traffic on he Internet Workshop (July 2005)"},{"key":"42_CR4","unstructured":"Hastings, N.E., McLean, P.A.: TCP \/IP Spoofing Fundamentals. IEEE\u00a03255-5 (1996)"},{"key":"42_CR5","unstructured":"Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection and Prevention, Tata Mc-Graw Hill edn., ISBN 0-07-061606-X"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Kim, Y., Lau, W.C., Chuah, M.C., Jonathan Chao, H.: PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. IEEE Transactions on Dependable And Secure Computing\u00a03(2) (April-June 2006)","DOI":"10.1109\/TDSC.2006.25"},{"key":"42_CR7","unstructured":"Koller, R., Rangaswami, R., Marrero, J., Hernandez, I., Smith, G.: Anatomy of a Real-time Intrusion Prevention System. In: International Conference on Automonic Computing School of Computing and Information Sciences, Florida International University\u00a0FL 33 (1996) 978-0-7695-3175-5"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:40:05Z","timestamp":1606185605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}