{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T05:46:29Z","timestamp":1738129589446,"version":"3.33.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2008,2,19]],"date-time":"2008-02-19T00:00:00Z","timestamp":1203379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1007\/s12243-008-0018-5","type":"journal-article","created":{"date-parts":[[2008,2,18]],"date-time":"2008-02-18T17:15:20Z","timestamp":1203354920000},"page":"207-221","source":"Crossref","is-referenced-by-count":5,"title":["A novel IPv6 traceback architecture using COPS protocol"],"prefix":"10.1007","volume":"63","author":[{"given":"Syed Obaid","family":"Amin","sequence":"first","affiliation":[]},{"given":"Muhammad Shoaib","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,2,19]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Belenky A, Ansari N (2003) Tracing multiple attackers with deterministic packet marking (DPM). In: PACRIM 2003, 49\u201352, Aug","DOI":"10.1109\/PACRIM.2003.1235716"},{"issue":"4","key":"18_CR2","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/LCOMM.2003.811200","volume":"7","author":"A Belenky","year":"2003","unstructured":"Belenky A, Ansari N (2003) IP traceback with deterministic packet marking IEEE Commun Lett 7(4):162\u2013164","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"18_CR3","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S Savage","year":"2001","unstructured":"Savage S, Wetherall D, Karlin A, Anderson T (2001) Network support for IP traceback. IEEE\/ACM Trans Net 9(3):226\u201337, June","journal-title":"IEEE\/ACM Trans Net"},{"issue":"7","key":"18_CR4","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/MCOM.2003.1215651","volume":"41","author":"A Belenky","year":"2003","unstructured":"Belenky A, Ansari N (2003) On IP traceback. IEEE Commun Mag 41(7):142\u2013153, July","journal-title":"IEEE Commun Mag"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Mankin A, Massey D, Wu C, Wu S, Zhang L (2001) On design and evaluation of \u2018intention-driven\u2019 ICMP traceback. In: ICCCN Oct 2001, pp. 159\u2013165","DOI":"10.1109\/ICCCN.2001.956234"},{"issue":"6","key":"18_CR6","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TNET.2002.804827","volume":"10","author":"AC Snoeren","year":"2002","unstructured":"Snoeren AC, Partridge C, Sanches LA, Jones CE, Tchakountio F, Kent ST, Strayer WT (2002) Single-packet IP traceback. ACM\/IEEE Trans Netw 10(6):721\u2013734","journal-title":"ACM\/IEEE Trans Netw"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Waldvogel M (2002) GOSSIB vs. IP traceback rumors. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 5\u201313","DOI":"10.1109\/CSAC.2002.1176273"},{"key":"18_CR8","volume-title":"Internet protocol, version 6 (IPv6) specification. RFC 2460","author":"S Deering","year":"1998","unstructured":"Deering S, Hinden R (1998) Internet protocol, version 6 (IPv6) specification. RFC 2460. IETF, Fremont, Dec"},{"key":"18_CR9","unstructured":"Convery S, Miller D (2004) IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0). http:\/\/www.cisco.com\/web\/about\/security\/security_services\/ciag\/documents\/v6-v4-threats.pdf"},{"key":"18_CR10","volume-title":"Terminology for policy-based management, RFC3198","author":"A Westerinen","year":"2001","unstructured":"Westerinen A, Schnizlein J, Strassner J, Scherling M, Quinn B, Herzog S, Huynh A, Carlson M, Perry J, Waldbusse S (2001) Terminology for policy-based management, RFC3198. IETF Fremont, Nov"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, April","DOI":"10.1145\/997150.997156"},{"key":"18_CR12","volume-title":"IP authentication header, RFC 2402","author":"S Kent","year":"1998","unstructured":"Kent S, Atinkson R, Black D (1998) IP authentication header, RFC 2402. IETF, Fremont, Nov"},{"key":"18_CR13","unstructured":"Gong C, Le T, Korkmaz T, Sarac K (2005) Single Packet IP Traceback in AS-level Partial Deployment Scenario. In: IEEE GLOBECOM Nov 2005"},{"key":"18_CR14","volume-title":"Connection of IPv6 domains via IPv4 clouds, RFC 3056","author":"B Carpenter","year":"2001","unstructured":"Carpenter B, Moore K (2001) Connection of IPv6 domains via IPv4 clouds, RFC 3056. IETF, Fremont, Feb"},{"key":"18_CR15","volume-title":"IPv6 tunnel broker, RFC 3053","author":"A Durand","year":"2001","unstructured":"Durand A, Fasano P, Lento D (2001) IPv6 tunnel broker, RFC 3053. IETF, Fremont, Jan"},{"key":"18_CR16","volume-title":"General packet tunneling in IPv6 specification, RFC 2473","author":"A Conta","year":"1998","unstructured":"Conta A, Deering S (1998) General packet tunneling in IPv6 specification, RFC 2473. IETF, Fremont, Dec"},{"key":"18_CR17","volume-title":"The COPS (Common Open Policy Service) protocol, RFC 2748","author":"D Durham","year":"2000","unstructured":"Durham D, Boyle J, Cohen R, Herzog S, Rajan R, Sastry A (2000) The COPS (Common Open Policy Service) protocol, RFC 2748. IETF, Fremont, Jan"},{"issue":"10","key":"18_CR18","doi-asserted-by":"crossref","first-page":"2655","DOI":"10.1093\/ietcom\/e90-b.10.2655","volume":"E90-B","author":"B Song","year":"2007","unstructured":"Song B, Heo J, Hong CS (2007) Collaborative defense mechanism using statistical detection method against DDoS attacks. IEICE Trans Commun E90-B(10):2655\u20132664, Oct 1","journal-title":"IEICE Trans Commun"},{"key":"18_CR19","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barabasi","year":"1999","unstructured":"Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286:509\u2013512, Oct","journal-title":"Science"},{"issue":"1\/2","key":"18_CR20","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1504\/IJSN.2007.012828","volume":"2","author":"T Korkmaz","year":"2007","unstructured":"Korkmaz T, GongC, Sarac K, Dykes SG (2007) Single packet IP traceback in AS-level partial deployment scenario IJSN 2(1\/2):95\u2013108","journal-title":"IJSN"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Strayer WT, Jones CE, Tchakountio F, Hain RR (2004) SPIE-IPv6: single IPv6 packet traceback. In: 29th Annual IEEE International Conference on Local Computer Networks 2004 Nov, pp. 118\u2013125","DOI":"10.1109\/LCN.2004.118"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0018-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-008-0018-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0018-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T16:27:33Z","timestamp":1738081653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-008-0018-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2,19]]},"references-count":21,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2008,4]]}},"alternative-id":["18"],"URL":"https:\/\/doi.org\/10.1007\/s12243-008-0018-5","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2008,2,19]]}}}