{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:22Z","timestamp":1773510862615,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/EU.html"}],"funder":[{"name":"National High-Tech Research and Development Program (863 Program) of China","award":["2013AA013505"],"award-info":[{"award-number":["2013AA013505"]}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61303194"],"award-info":[{"award-number":["61303194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61472213"],"award-info":[{"award-number":["61472213"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002858","name":"China Post-Doctoral Science Foundation","doi-asserted-by":"publisher","award":["2013M530047"],"award-info":[{"award-number":["2013M530047"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tifs.2014.2381873","type":"journal-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T08:15:57Z","timestamp":1418976957000},"page":"471-484","source":"Crossref","is-referenced-by-count":70,"title":["Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter"],"prefix":"10.1109","volume":"10","author":[{"given":"Guang","family":"Yao","sequence":"first","affiliation":[]},{"given":"Jun","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"ref32","volume":"1","author":"richard stevens","year":"1993","journal-title":"TCP\/IP Illustrated The Protocols"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0777"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851237"},{"key":"ref37","year":"0","journal-title":"IP Geolocation Dataset"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref10","first-page":"878","article-title":"Advanced and authenticated marking schemes for IP traceback","volume":"2","author":"song","year":"2001","journal-title":"Proc IEEE 20th Annu Joint Conf IEEE Comput Commun Soc (INFOCOM)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.009"},{"key":"ref13","first-page":"338","article-title":"On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack","volume":"1","author":"park","year":"2001","journal-title":"Proc IEEE 20th Annu Joint Conf IEEE Comput Commun Soc (INFOCOM)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1059513.1059517"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.132"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2007.15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962652"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/ICCCN.2001.956234","article-title":"On design and evaluation of &#x2018;intention-driven&#x2019; ICMP traceback","author":"mankin","year":"2001","journal-title":"Proc 10th Int Conf Comput Commun Netw"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70817"},{"key":"ref4","year":"0","journal-title":"The UCSD Network Telescope"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169960"},{"key":"ref3","article-title":"Bots, DDoS and ground truth","author":"labovitz","year":"0"},{"key":"ref6","author":"bellovin","year":"2003","journal-title":"ICMP traceback messages"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"ref5","first-page":"295","article-title":"Practical network support for IP traceback","author":"savage","year":"2000","journal-title":"Proc Conf Appl Technol Archit Protocols Comput Commun (SIGCOMM)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383060"},{"key":"ref2","article-title":"Distributed denial of service (DDOS) attacks","year":"2006"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/586110.586128","article-title":"Efficient packet marking for large-scale IP traceback","author":"goodrich","year":"2002","journal-title":"Proc 9th ACM Conf Comput Commun Secur (CCS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-540-39927-8_12","article-title":"ICMP traceback with cumulative path, an efficient solution for IP traceback","author":"lee","year":"2003","journal-title":"Information and Communications Security"},{"key":"ref22","first-page":"199","article-title":"CenterTrack: An IP overlay network for tracking DoS floods","volume":"9","author":"stone","year":"2000","journal-title":"Proc 9th Usenix Security Symp"},{"key":"ref21","first-page":"319","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc LISA"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.08.010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804322"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.63"},{"key":"ref25","first-page":"115","article-title":"Large-scale IP traceback in high-speed internet: Practical techniques and theoretical foundation","author":"li","year":"2004","journal-title":"Proc IEEE Symp Secur Privacy"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7019030\/06987335.pdf?arnumber=6987335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T19:54:06Z","timestamp":1690746846000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6987335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":38,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2381873","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}