{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:51:30Z","timestamp":1742388690468},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2004.1401609","type":"proceedings-article","created":{"date-parts":[[2005,3,21]],"date-time":"2005-03-21T15:07:39Z","timestamp":1111417659000},"page":"146-151","source":"Crossref","is-referenced-by-count":13,"title":["Topology based packet marking"],"prefix":"10.1109","author":[{"given":"B.","family":"Al-Duwairi","sequence":"first","affiliation":[]},{"given":"T.E.","family":"Daniels","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Detecting SYN flooding attacks","author":"wang","year":"2002","journal-title":"Proc of IEEE INFOCOMM 2002"},{"key":"17","article-title":"Centertrack: An IP overlay network for tracking DoS floods","author":"stone","year":"2000","journal-title":"Proc of 9th USENIX Security Symposium"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"journal-title":"ICMP traceback messages","year":"2000","author":"bellovin","key":"15"},{"key":"16","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"song","year":"2001","journal-title":"Proc of IEEE INFOCOMM 2001"},{"key":"13","article-title":"On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack","author":"park","year":"2001","journal-title":"Proc of IEEE INFOCOM 2001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/316188.316229","article-title":"On power law relationships of the Internet topology","author":"faloutsos","year":"1999","journal-title":"Proc of SIGCOMM '99"},{"journal-title":"Attack on Internet Called Largest Ever","year":"2002","author":"mcguire","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2004.1316096"},{"key":"1","article-title":"An efficient packet marking scheme for IP traceback","author":"al-duwairi","year":"2004","journal-title":"Proc of Networking 2004"},{"key":"10","article-title":"A path information cashing and aggregation approach to traffic source identification","author":"hsu","year":"2003","journal-title":"Proc of IEEE International Conference on Distributed Computing Systems (ICDCS)"},{"key":"7","article-title":"Mapping and visualizing the internet","author":"cheswick","year":"0","journal-title":"Proc USENIX Annual Technical Conference 2000"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505588"},{"key":"5","first-page":"319","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc 2000 USENIX USA Conf"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258461"},{"key":"8","article-title":"On power-law relationships of the internet topology","author":"faloulsos","year":"1999","journal-title":"Proc of ACM SIGCOMM"}],"event":{"name":"13th International Conference on Computer Communications and Networks","acronym":"ICCCN-04","location":"Chicago, IL, USA"},"container-title":["Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9617\/30391\/01401609.pdf?arnumber=1401609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:34:41Z","timestamp":1497620081000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1401609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icccn.2004.1401609","relation":{},"subject":[]}}