{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:04:40Z","timestamp":1729641880578,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icccn.2011.6005783","type":"proceedings-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T16:51:51Z","timestamp":1318524711000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network"],"prefix":"10.1109","author":[{"given":"Guangwu","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wenlong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","author":"ferguson","year":"2000","journal-title":"RFC 2827"},{"journal-title":"Unicast reverse path forwarding","year":"2007","key":"ref11"},{"key":"ref12","article-title":"SAVE: Source Address Validity Enforcement Protocol","author":"li","year":"2002","journal-title":"Proceedings of INFOCOM 2002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497921"},{"key":"ref14","first-page":"413","article-title":"Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method","volume":"4","author":"jun","year":"2009","journal-title":"Tsinghua Science and Technology"},{"key":"ref15","article-title":"StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks","author":"perrig","year":"2003","journal-title":"Technical Report CMU-C S-02-208"},{"journal-title":"BASE An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention","year":"2004","author":"lee","key":"ref16"},{"key":"ref17","article-title":"Host identity protocol (HIP) architecture","author":"moskowitz","year":"2006","journal-title":"RFC 4423"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626229"},{"key":"ref19","article-title":"Cryptographically generated addresses (ega)","author":"aura","year":"2005","journal-title":"RFC 3972"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2000.839372"},{"key":"ref27","article-title":"Active internet traffic filtering: real-time response to denial-of-service attacks","author":"argyraki","year":"2005","journal-title":"USENIX 2005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"ref6","first-page":"2","article-title":"Defenses against TCP SYN flooding attacks","author":"eddy","year":"2006","journal-title":"The Internet Prot ocol Journal"},{"journal-title":"CERT advisory smurf IP denial-of-service attacks","year":"2003","key":"ref5"},{"key":"ref8","article-title":"A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience","author":"wu","year":"2008","journal-title":"RFC 5210"},{"year":"0","key":"ref7"},{"year":"2009","key":"ref2"},{"journal-title":"Source Address Validation Improvement Framework","year":"2010","author":"wu","key":"ref9"},{"year":"2010","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1145\/1402946.1402997","article-title":"Accountable Internet Protocol (AlP)","author":"andersen","year":"2008","journal-title":"Proc ACM Sigcomm"},{"journal-title":"ICMP traceback messages","year":"2003","author":"bellovin","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"ref23","article-title":"CenterTrack: an IP overlay network for tracking DoS floods","author":"stone","year":"2000","journal-title":"USENIX Security Symposium 2000"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"ref25","first-page":"338","article-title":"On the effectiveness of probabilistic packet marking for IP traceback under Denial of Service attack","author":"park","year":"2001","journal-title":"Proceedings of IEEE Infocomm"}],"event":{"name":"2011 20th International Conference on Computer Communications and Networks (ICCCN 2011)","start":{"date-parts":[[2011,7,31]]},"location":"Maui, HI","end":{"date-parts":[[2011,8,4]]}},"container-title":["2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6005186\/6005707\/06005783.pdf?arnumber=6005783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T03:55:18Z","timestamp":1497930918000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6005783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icccn.2011.6005783","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}