{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T05:44:31Z","timestamp":1741067071065,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_11","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"129-136","source":"Crossref","is-referenced-by-count":4,"title":["An IP Traceback Model for Network Forensics"],"prefix":"10.1007","author":[{"given":"Emmanuel S.","family":"Pilli","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. C.","family":"Joshi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rajdeep","family":"Niyogi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Lee, S.C., Shields, C.: Tracing the Source of Network Attack: A Technical, Legal and Societal Problem. In: IEEE Workshop IAS, New York, pp. 239\u2013246 (2001)"},{"key":"11_CR2","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research. In: Proc. 1st Digital Forensic Research Workshop (DFRWS), pp. 27\u201330 (2001)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: Survey and research challenges. Digit. Investig, available online March (2010) (in press)","DOI":"10.1016\/j.diin.2010.02.003"},{"issue":"5","key":"11_CR4","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/MCOM.2005.1453433","volume":"43","author":"Z. Gao","year":"2005","unstructured":"Gao, Z., Ansari, N.: Tracing Cyber Attacks from the Practical Perspective. IEEE Communications Magazine\u00a043(5), 123\u2013131 (2005)","journal-title":"IEEE Communications Magazine"},{"key":"11_CR5","first-page":"79","volume":"1","author":"L. Santhanam","year":"2006","unstructured":"Santhanam, L., Kumar, A., Agrawal, D.P.: Taxonomy of IP Traceback. J. Info. Assurance and Security\u00a01, 79\u201394 (2006)","journal-title":"J. Info. Assurance and Security"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakoutio, F., Kent, S.T., Strayer, S.T.: Hash-Based IP Traceback. In: Proceedings of ACM SIGCOMM (2001)","DOI":"10.1145\/383059.383060"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Baba, T., Matsuda, S.: Tracing Network Attacks to Their Sources. IEEE Internet Computing, 20\u201326 (March\/April 2002)","DOI":"10.1109\/4236.991439"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S. Savage","year":"2001","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP Traceback. IEEE\/ACM Transactions on Networking\u00a09(3), 226\u2013237 (2001)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"11_CR9","unstructured":"Song, D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proceedings of the IEEE INFOCOM 2001, Arkansas, USA (2001)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/505586.505588","volume":"5","author":"D. Dean","year":"2002","unstructured":"Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Transactions on Information and System Security\u00a05, 119\u2013137 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: FIT: Fast Internet Traceback. In: Proc. IEEE 24th Ann. Joint Conf. Computer and Comm. Societies (INFOCOMM 2005), pp. 1395\u20131407 (2005)","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"11_CR12","first-page":"732","volume":"51","author":"A. Belenky","year":"2006","unstructured":"Belenky, A., Ansari, N.: On Deterministic Packet Marking. Computer Networks\u00a051, 732\u2013750 (2006)","journal-title":"Computer Networks"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-30555-2_47","volume-title":"Distributed Computing and Internet Technology","author":"S.K. Rayanchu","year":"2004","unstructured":"Rayanchu, S.K., Barua, G.: Tracing Attackers with Deterministic Edge Router Marking (DERM). In: Ghosh, R.K., Mohanty, H. (eds.) ICDCIT 2004. LNCS, vol.\u00a03347, pp. 400\u2013409. Springer, Heidelberg (2004)"},{"issue":"5","key":"11_CR14","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TPDS.2006.63","volume":"17","author":"A. Duwairi","year":"2006","unstructured":"Duwairi, A., Manimaran, G.: Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback. IEEE Trans. Parallel and Dist. Sys.\u00a017(5), 403\u2013418 (2006)","journal-title":"IEEE Trans. Parallel and Dist. Sys."},{"key":"11_CR15","unstructured":"Jing, Y.N., Tu, P., Wang, X.P., Zhang, G.D.: Distributed log based scheme. In: Proc of 5th Int\u2019l. Conf. on Computer and Information Technology (2005)"},{"issue":"10","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TPDS.2007.70817","volume":"19","author":"C. Gong","year":"2008","unstructured":"Gong, C., Sarac, K.: A More Practical Approach for Single-Packet IP Traceback using Packet Marking and Logging. IEEE Trans. Parallel and Dist. Sys.\u00a019(10), 1310\u20131324 (2008)","journal-title":"IEEE Trans. Parallel and Dist. Sys."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Jing, W.X., Lin, X.Y.: IP Traceback based on Deterministic Packet Marking and Logging. In: Proc. IEEE Int\u2019l. Conf. on Scalable Computing and Comm., pp. 178\u2013182 (2009)","DOI":"10.1109\/EmbeddedCom-ScalCom.2009.40"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Paruchuri, V., Durresi, A., Kannan, R., Iyengar, S.S.: Authentic Autonomous Traceback. In: Proc. 18th Int\u2019l Conf. Adv. Info. Networking and Appln., pp. 406\u2013413 (2004)","DOI":"10.1109\/AINA.2004.1283944"},{"issue":"3","key":"11_CR19","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1016\/j.comnet.2006.06.003","volume":"51","author":"Z. Gao","year":"2007","unstructured":"Gao, Z., Ansari, N.: A practical and robust inter-domain marking scheme for IP traceback. Computer Networks\u00a051(3), 732\u2013750 (2007)","journal-title":"Computer Networks"},{"issue":"1\/2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1504\/IJSN.2007.012828","volume":"2","author":"T. Korkmaz","year":"2007","unstructured":"Korkmaz, T., et al.: Single packet IP traceback in AS-level partial deployment scenario. Int. J. Security and Networks\u00a02(1\/2), 95\u2013108 (2007)","journal-title":"Int. J. Security and Networks"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Castelucio, A., Ziviani, A., Salles, R.M.: An AS-level Overlay Network for IP Traceback. IEEE Network, 36\u201341 (2009)","DOI":"10.1109\/MNET.2009.4804322"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/1015040.1015041","volume":"7","author":"B. Carrier","year":"2004","unstructured":"Carrier, B., Shields, C.: The Session Token Protocol for Forensics and Traceback. ACM Trans. on Info. System Security\u00a07(3), 333\u2013362 (2004)","journal-title":"ACM Trans. on Info. System Security"},{"issue":"1","key":"11_CR23","first-page":"1","volume":"6","author":"O. Demir","year":"2007","unstructured":"Demir, O., Ping, J., Kim, J.: Session Based Packet Marking and Auditing for Network Forensics. Int\u2019l. Journal of Digital Evidence\u00a06(1), 1\u201315 (2007)","journal-title":"Int\u2019l. Journal of Digital Evidence"},{"issue":"3-4","key":"11_CR24","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.diin.2008.12.002","volume":"5","author":"M.I. Cohen","year":"2009","unstructured":"Cohen, M.I.: Source attribution for network address translated forensic captures. Digit. Investig.\u00a05(3-4), 138\u2013145 (2009)","journal-title":"Digit. Investig."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T15:07:57Z","timestamp":1741014477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}