{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:23:14Z","timestamp":1768681394581,"version":"3.49.0"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1016\/j.cose.2017.08.012","type":"journal-article","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T19:01:12Z","timestamp":1504119672000},"page":"13-25","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":33,"special_numbering":"C","title":["Record route IP traceback: Combating DoS attacks and the variants"],"prefix":"10.1016","volume":"72","author":[{"given":"Abdullah Yasin","family":"Nur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2157-2780","authenticated-orcid":false,"given":"Mehmet Engin","family":"Tozal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.cose.2017.08.012_bib0010","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1109\/TPDS.2006.63","article-title":"Novel hybrid schemes employing packet marking and logging for IP traceback","volume":"17","author":"Al-Duwairi","year":"2006","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10.1016\/j.cose.2017.08.012_bib0015","author":"Angrishi"},{"issue":"4","key":"10.1016\/j.cose.2017.08.012_bib0020","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/LCOMM.2003.811200","article-title":"IP traceback with deterministic packet marking","volume":"7","author":"Belenky","year":"2003","journal-title":"IEEE Commun Lett"},{"issue":"10","key":"10.1016\/j.cose.2017.08.012_bib0025","doi-asserted-by":"crossref","first-page":"2677","DOI":"10.1016\/j.comnet.2006.11.020","article-title":"On deterministic packet marking","volume":"51","author":"Belenky","year":"2007","journal-title":"Comput Netw"},{"key":"10.1016\/j.cose.2017.08.012_bib0030","series-title":"Proc. of 14th systems administration conference, USENIX","article-title":"Tracing anonymous packets to their approximate source","author":"Burch","year":"2000"},{"key":"10.1016\/j.cose.2017.08.012_bib0035","series-title":"Proc. of ACM IMC","article-title":"Internet optometry: assessing the broken glasses in internet reachability","author":"Bush","year":"2009"},{"key":"10.1016\/j.cose.2017.08.012_bib0040","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","article-title":"Denial-of-service attack-detection techniques","volume":"10","author":"Carl","year":"2006","journal-title":"IEEE Internet Comput"},{"key":"10.1016\/j.cose.2017.08.012_bib0045","series-title":"ACM transactions on information and system security","article-title":"An algebraic approach to IP traceback","author":"Dean","year":"2002"},{"key":"10.1016\/j.cose.2017.08.012_bib0050","series-title":"Proc. of IFIP IEEE","article-title":"MonoScope: automating network faults diagnosis based on active measurements","author":"Fok","year":"2013"},{"key":"10.1016\/j.cose.2017.08.012_bib0055","series-title":"IEEE 28th international conference on advanced information networking and applications","first-page":"597","article-title":"TDFA: traceback-based defense against DDoS flooding attacks","author":"Foroushani","year":"2014"},{"key":"10.1016\/j.cose.2017.08.012_bib0060","series-title":"Proceedings of 2015 open conference of electrical, electronic and information sciences (eStream 2015)","article-title":"Packet size distribution tendencies in computer network flows","author":"Garsva","year":"2015"},{"key":"10.1016\/j.cose.2017.08.012_bib0065","series-title":"Proc. of IEEE international conference on communications","article-title":"IP traceback based on packet marking and logging","author":"Gong","year":"2005"},{"issue":"1","key":"10.1016\/j.cose.2017.08.012_bib0070","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNET.2007.910594","article-title":"Probabilistic packet marking for large-scale ip traceback","volume":"16","author":"Goodrich","year":"2008","journal-title":"IEEE ACM Trans Netw"},{"key":"10.1016\/j.cose.2017.08.012_bib0080","series-title":"Proc. of USENIX NSDI","article-title":"Reverse traceroute","author":"Katz-Bassett","year":"2010"},{"key":"10.1016\/j.cose.2017.08.012_bib0085","series-title":"Proc. of OSDI","article-title":"iPlane: an information plane for distributed services","author":"Madhyastha","year":"2006"},{"issue":"6","key":"10.1016\/j.cose.2017.08.012_bib0090","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/JSAC.2003.814364","article-title":"Tearing down the internet","volume":"21","author":"Magoni","year":"2003","journal-title":"IEEE J Select Areas Commun"},{"issue":"2","key":"10.1016\/j.cose.2017.08.012_bib0095","doi-asserted-by":"crossref","DOI":"10.1145\/997150.997156","article-title":"A taxonomy of DDoS attack and DDoS defense mechanisms","volume":"34","author":"Mirkovic","year":"2004","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"10.1016\/j.cose.2017.08.012_bib0105","series-title":"IEEE international conference on smart computing, SmartComp","article-title":"Defending cyber-physical systems against DoS attacks","author":"Nur","year":"2016"},{"key":"10.1016\/j.cose.2017.08.012_bib0110","author":"PlanetLab"},{"key":"10.1016\/j.cose.2017.08.012_bib0125","series-title":"Proc. of USENIX NSDI","article-title":"Dasu: pushing experiments to the internet's edge","author":"Sanchez","year":"2013"},{"issue":"3","key":"10.1016\/j.cose.2017.08.012_bib0130","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/90.929847","article-title":"Network support for IP traceback","volume":"9","author":"Savage","year":"2001","journal-title":"IEEE ACM Trans Netw"},{"key":"10.1016\/j.cose.2017.08.012_bib0135","series-title":"Proc. IEEE INFOCOM","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"Song","year":"2001"},{"key":"10.1016\/j.cose.2017.08.012_bib0140","author":"The Guardian"},{"key":"10.1016\/j.cose.2017.08.012_bib0145","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1080\/00029890.1954.11988466","article-title":"Coupon collecting for unequal probabilities","volume":"61","author":"von Schelling","year":"1954","journal-title":"Am Math Mon"},{"issue":"2","key":"10.1016\/j.cose.2017.08.012_bib0155","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/TIFS.2011.2107320","article-title":"Low-rate DDoS attacks detection and traceback by using new information metrics","volume":"6","author":"Xiang","year":"2011","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"10.1016\/j.cose.2017.08.012_bib0160","series-title":"Proc. IEEE INFOCOM","article-title":"FIT: fast Internet Traceback","author":"Yaar","year":"2005"},{"issue":"10","key":"10.1016\/j.cose.2017.08.012_bib0165","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.2006.877138","article-title":"StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense","volume":"24","author":"Yaar","year":"2006","journal-title":"IEEE J Select Areas Commun"},{"issue":"3","key":"10.1016\/j.cose.2017.08.012_bib0170","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TPDS.2010.97","article-title":"Traceback of DDoS attacks using entropy variations","volume":"22","author":"Yu","year":"2011","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"10.1016\/j.cose.2017.08.012_bib0175","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A survey of defense mechanisms against distributed denial of service(DDoS) flooding attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Commun Surv Tutor"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404817301773?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404817301773?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T15:37:36Z","timestamp":1575387456000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404817301773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":29,"alternative-id":["S0167404817301773"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2017.08.012","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Record route IP traceback: Combating DoS attacks and the variants","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2017.08.012","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}