{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:17:34Z","timestamp":1758845854199},"reference-count":32,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0140-3664(02)00219-0","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"861-871","source":"Crossref","is-referenced-by-count":19,"title":["On detecting service violations and bandwidth theft in QoS network domains"],"prefix":"10.1016","volume":"26","author":[{"given":"Ahsan","family":"Habib","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Fahmy","sequence":"additional","affiliation":[]},{"given":"Srinivas R.","family":"Avasarala","sequence":"additional","affiliation":[]},{"given":"Venkatesh","family":"Prabhakar","sequence":"additional","affiliation":[]},{"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/S0140-3664(02)00219-0_BIB1","doi-asserted-by":"crossref","DOI":"10.1109\/35.841840","article-title":"The use of end-to-end multicast measurements for characterizing internal network behavior","volume":"38","author":"Adams","year":"2000","journal-title":"IEEE Communications"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB2","doi-asserted-by":"crossref","DOI":"10.1145\/502034.502048","article-title":"Resilient overlay network","volume":"October","author":"Anderson","year":"2001","journal-title":"Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff Canada"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB3","doi-asserted-by":"crossref","unstructured":"S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss, An architecture for differentiated services, RFC 2475, December, 1998.","DOI":"10.17487\/rfc2475"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB4","doi-asserted-by":"crossref","unstructured":"R. Braden, L. Zhang, S. Berson, S. Herzog, S. Jamin, Resource ReSerVation Protocol (RSVP), RFC 2205, September, 1997.","DOI":"10.17487\/rfc2205"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB5","article-title":"Efficiently monitoring bandwidth and latency in IP networks","volume":"April","author":"Breitbart","year":"2001","journal-title":"Proceedings of the IEEE INFOCOM, Alaska"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB6","doi-asserted-by":"crossref","DOI":"10.1145\/511334.511338","article-title":"Network tomography on general topologies","volume":"June","author":"Bu","year":"2002","journal-title":"ACM SIGMETRICS"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB7","article-title":"Multicast-based inference of network-internal loss characteristics","volume":"November","author":"C\u00e1ceres","year":"1999","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB8","unstructured":"R. Callon, P. Doolan, N. Feldman, A. Fredette, G. Swallow, A. Viswanathan, A framework for multiprotocol label switching, Internet Draft, 2000."},{"key":"10.1016\/S0140-3664(02)00219-0_BIB9","doi-asserted-by":"crossref","unstructured":"J. Case, M. Fedor, M. Schoffstall, J. Davin, A simple network management protocol (SNMP), IETF RFC 1157, May, 1990.","DOI":"10.17487\/rfc1157"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB10","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/ICNP.2000.896290","article-title":"A scalable monitoring approach for service level agreements validation","volume":"November","author":"Chan","year":"2000","journal-title":"Proceedings of the International Conference on Network Protocols (ICNP)"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB11","article-title":"Network delay distribution inference from end-to-end unicast measurement","volume":"May","author":"Coates","year":"2001","journal-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB12","article-title":"Network loss inference using unicast end-to-end measurement","volume":"September","author":"Coates","year":"2000","journal-title":"Proceedings of the ITC Conference on IP Traffic, Modeling and Management, Monterey, CA"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB13","article-title":"Hackers said to cost US billions","volume":"February","author":"DeLong","year":"2001","journal-title":"E-commerce Times Online"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB14","article-title":"Efficient reactive monitoring","volume":"April","author":"Dilman","year":"2001","journal-title":"Proceedings of the IEEE INFOCOM, Alaska"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB15","article-title":"Inferring link loss using striped unicast probes","volume":"April","author":"Duffield","year":"2001","journal-title":"Proceedings of the IEEE INFOCOM, Alaska"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB16","doi-asserted-by":"crossref","unstructured":"P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing agreements performance monitoring, RFC 2827, May, 2000.","DOI":"10.17487\/rfc2827"},{"issue":"4","key":"10.1016\/S0140-3664(02)00219-0_BIB17","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/90.251892","article-title":"Random early detection gateways for congestion avoidance","volume":"1","author":"Floyd","year":"1993","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB18","doi-asserted-by":"crossref","unstructured":"J. Heinanen, F. Baker, W. Weiss, J. Wroclawski, Assured forwarding PHB group, RFC 2597, June, 1999.","DOI":"10.17487\/rfc2597"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB19","doi-asserted-by":"crossref","unstructured":"V. Jacobson, K. Nichols, K. Poduri, An expedited forwarding PHB,RFC 2598, June, 1999.","DOI":"10.17487\/rfc2598"},{"issue":"5","key":"10.1016\/S0140-3664(02)00219-0_BIB20","doi-asserted-by":"crossref","DOI":"10.1109\/49.842988","article-title":"Toward efficient monitoring","volume":"18","author":"Jiao","year":"2000","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB21","doi-asserted-by":"crossref","unstructured":"M. Mahajan et al., Controlling high bandwidth aggregates in the network, Technical Report, ACIRI, February, 2001.","DOI":"10.1109\/ICNP.2001.992899"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB22","article-title":"Simple performance models of differentiated services schemes for the Internet","volume":"March","author":"May","year":"1999","journal-title":"Proceedings of the IEEE INFOCOM, New York"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB23","unstructured":"S. McCanne, S. Floyd, Network simulator ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/, 1997."},{"key":"10.1016\/S0140-3664(02)00219-0_BIB24","article-title":"Inferring Internet denial-of-service activity","author":"Moore","year":"2001","journal-title":"Proceedings of the USENIX"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB25","doi-asserted-by":"crossref","unstructured":"K. Nichols, S. Blake, F. Baker, D. Black, Definition of the differentiated service field (DS field) in the IPv4 and IPv6 Headers, RFC 2474, December, 1998.","DOI":"10.17487\/rfc2474"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB26","doi-asserted-by":"crossref","unstructured":"V. Paxson, Measurement and analysis of end-to-end internet dynamics, PhD thesis, Computer Science Division, University of California, Berkeley, 1997.","DOI":"10.2172\/551971"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB27","doi-asserted-by":"crossref","unstructured":"V. Paxson, G. Almes, J. Mahdavi, M. Mathis, Framework for IP performance metrics, IETF RFC 2330, May, 1998.","DOI":"10.17487\/rfc2330"},{"issue":"1","key":"10.1016\/S0140-3664(02)00219-0_BIB28","doi-asserted-by":"crossref","DOI":"10.1109\/40.748796","article-title":"Detour: a case for informed Internet routing and transport","volume":"19","author":"Savage","year":"1999","journal-title":"IEEE Micro"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB29","article-title":"SPAND: shared passive network performance discovery","volume":"December","author":"Seshan","year":"1997","journal-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS'97)"},{"key":"10.1016\/S0140-3664(02)00219-0_BIB30","unstructured":"F. Shallwani, J. Ethridge, P. Pieda, M. Baines, Diff-Serv implementation for ns, http:\/\/www7.nortel.com:8080\/CTL\/#software, 2000."},{"key":"10.1016\/S0140-3664(02)00219-0_BIB31","unstructured":"Y. Tsang, M.J. Coates, R. Nowak, Passive unicast network tomography based on TCP monitoring, Technical report, November, 2000."},{"key":"10.1016\/S0140-3664(02)00219-0_BIB32","unstructured":"F. Zhi, S.W. Felix, T.S. Wu, H. Huang, F. Gong, Security issues for differentiated service framework, Internet Engineering Task Force Draft, October, 1999."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366402002190?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366402002190?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T12:09:49Z","timestamp":1682424589000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366402002190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":32,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0140366402002190"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(02)00219-0","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}