{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:49:29Z","timestamp":1729644569160,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocom.2016.7842346","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T20:56:26Z","timestamp":1486500986000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards Loop-Free Forwarding of Anonymous Internet Datagrams That Enforce Provenance"],"prefix":"10.1109","author":[{"given":"J. J.","family":"Garcia-Luna-Aceves","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Detecting SYN Flooding Attacks","author":"wang","year":"2002","journal-title":"Proc IEEE Info-Com'02"},{"key":"ref38","article-title":"A Practial Method To Counteract Denial of Service Attacks","author":"tupakula","year":"2003","journal-title":"Proceedings of ACSC'03"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/383059.383060"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347560","article-title":"Practical Network Support for IP Traceback","author":"savage","year":"2000","journal-title":"Proc ACM SIGCOMM '00"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1216370.1216373"},{"key":"ref37","article-title":"A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks","volume":"15","author":"taghavi","year":"0","journal-title":"IEEE Comm Surveys and Tutorials"},{"key":"ref36","article-title":"defending against Denial of Service Attacks in Scout","author":"spatscheck","year":"1999","journal-title":"Proceedings of the Operating Systems Design and Implementation Symposium"},{"key":"ref35","article-title":"Centertrack: An IP Overlay Network for Tracking DoS Floods","author":"stone","year":"1999","journal-title":"Proc 9th USENIX Security Symposium"},{"key":"ref34","article-title":"Advanced and Authenticated Marking Schemes for IP Traceback","author":"song","year":"2001","journal-title":"Proc IEEE INFOCOM'01"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSE.1987.232894"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/3-540-45474-8_8"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.17487\/rfc4987"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1516539.1516541"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.17487\/rfc2827"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/75246.75268"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IFIPNetworking.2015.7145302"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.21236\/ADA401819"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1016707.1016717"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/948109.948116"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/371920.372148"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/964723.383061"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1402958.1402997"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.17487\/rfc5201"},{"key":"ref3","article-title":"Internet Denial of Service Attacks and Defense Mechanisms","author":"abliz","year":"2011","journal-title":"Report No TR-11-178 Univ of Pittsburg"},{"year":"0","author":"bernstein","article-title":"SYN Cookies","key":"ref6"},{"key":"ref29","article-title":"Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring","author":"peng","year":"2004","journal-title":"Proc of the IFIP Networking '04"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.17487\/rfc1812"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/INFCOM.2005.1497921"},{"key":"ref7","article-title":"A Novel Approach to Detection of Denial-of-Service Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods","author":"blazek","year":"2001","journal-title":"IEEE Systems Man and Cybernetics Information Assurance Workshop"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/GLOCOM.2003.1258459"},{"key":"ref9","article-title":"Tracing Anonymous Packets to Their Approximate Source","author":"burch","year":"2000","journal-title":"Proc 14th Syst Admin Conf"},{"key":"ref1","article-title":"On Distributed Communications: I. Introduction fo Distributed Communication Networks","author":"baran","year":"1964","journal-title":"Memorandum RM-3420-PR The RAND Corporation"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/633025.633032"},{"key":"ref22","article-title":"SAVE: Source Address Validity Enforcement Protocol","author":"li","year":"2002","journal-title":"Proc IEEE INFOCOM'02"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1028788.1028812"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/JSAC.2006.877138"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/RISP.1992.213265"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"ref23","article-title":"Passport: Secure and Adoptable Source Authentication","author":"liu","year":"2008","journal-title":"Proc USENIX'08"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/997150.997156"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICNP.2002.1181418"}],"event":{"name":"GLOBECOM 2016 - 2016 IEEE Global Communications Conference","start":{"date-parts":[[2016,12,4]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840067\/7841475\/07842346.pdf?arnumber=7842346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T11:13:19Z","timestamp":1568805199000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7842346\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/glocom.2016.7842346","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}