{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:44:50Z","timestamp":1775144690755,"version":"3.50.1"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong ITF","award":["UIM\/285"],"award-info":[{"award-number":["UIM\/285"]}]},{"name":"Hong Kong GRF","award":["PolyU 5389\/13E"],"award-info":[{"award-number":["PolyU 5389\/13E"]}]},{"name":"Shenzhen City Science and Technology R&D Fund","award":["JCYJ20150630115257892"],"award-info":[{"award-number":["JCYJ20150630115257892"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602371"],"award-info":[{"award-number":["61602371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471228"],"award-info":[{"award-number":["61471228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province","award":["2016JQ6034"],"award-info":[{"award-number":["2016JQ6034"]}]},{"DOI":"10.13039\/501100001809","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015M582663"],"award-info":[{"award-number":["2015M582663"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Postdoctoral Science Research Project"},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Project of Guangdong Province Science and Technology Plan","award":["2015B020233018"],"award-info":[{"award-number":["2015B020233018"]}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["1642129"],"award-info":[{"award-number":["1642129"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["1740791"],"award-info":[{"award-number":["1740791"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tifs.2018.2815555","type":"journal-article","created":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T18:18:58Z","timestamp":1520965138000},"page":"2423-2438","source":"Crossref","is-referenced-by-count":57,"title":["LinkScope: Toward Detecting Target Link Flooding Attacks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5321-5740","authenticated-orcid":false,"given":"Lei","family":"Xue","sequence":"first","affiliation":[]},{"given":"Xiaobo","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Edmond W. W.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Tony T. N.","family":"Miu","sequence":"additional","affiliation":[]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062053"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194882"},{"key":"ref33","year":"2017","journal-title":"Looking Glass"},{"key":"ref32","year":"2017","journal-title":"Looking Glass"},{"key":"ref31","year":"2017","journal-title":"Looking Glass"},{"key":"ref30","year":"2017","journal-title":"Traceroute Looking Glass"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015474"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.40"},{"key":"ref35","first-page":"1","article-title":"Design and implementation of TCP data probes for reliable and metric-rich network path monitoring","author":"luo","year":"2009","journal-title":"Proc USENIX ATC"},{"key":"ref34","year":"2017","journal-title":"NTT Public Looking Glass"},{"key":"ref28","year":"2017","journal-title":"Cogentco Looking Glass"},{"key":"ref27","first-page":"1","article-title":"On routing asymmetry in the Internet","author":"he","year":"2005","journal-title":"Proc IEEE Globecom"},{"key":"ref29","year":"2017","journal-title":"Eurorings Looking Glass"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.108"},{"key":"ref22","first-page":"47","article-title":"Defending against evolving ddos attacks: A case study using link flooding incidents","author":"kang","year":"2016","journal-title":"Proc Cambridge Int Workshop Secur Protocols"},{"key":"ref21","first-page":"397","article-title":"Towards mitigating link flooding attack via incremental SDN deployment","author":"wang","year":"2016","journal-title":"Proc ISCC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815304"},{"key":"ref23","author":"tirumala","year":"2005","journal-title":"Iperf The TCP\/UDP Bandwidth Measurement Tool"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660299"},{"key":"ref100","year":"2017","journal-title":"pingb Bandwidth Measuring Ping"},{"key":"ref25","author":"crovella","year":"2006","journal-title":"Internet Measurement Infrastructure Traffic and Applications"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23147"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3357"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079311"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879154"},{"key":"ref56","first-page":"1","article-title":"On a new class of pulsing Denial-of-Service attacks and the defense","author":"luo","year":"2005","journal-title":"Proc NDSS"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.110311.110110"},{"key":"ref54","year":"2016","journal-title":"Caida Data&#x2014;Overview of Datasets Monitors and Reports"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633039"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504758"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2465765"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.55"},{"key":"ref6","year":"2015","journal-title":"New DDoS Attack LFA is Launched to Attack Netease From May 9"},{"key":"ref5","first-page":"127","article-title":"The crossfire attack","author":"kang","year":"2013","journal-title":"Proc s of the IEEE"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098855"},{"key":"ref7","first-page":"417","article-title":"CoDef: Collaborative defense against large-scale link-flooding attacks","author":"kang","year":"2013","journal-title":"Proc ACM CoNEXT"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.78"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2010.5471988"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0030-0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.32"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2015.7387423"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.06.006"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2011.5931347"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2307\/2347162"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.2.09"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366308"},{"key":"ref71","year":"2016","journal-title":"Htop&#x2014;An Interactive Process Viewer for Unix"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"3531","DOI":"10.1016\/j.comnet.2012.02.019","article-title":"A tool for the generation of realistic network workload for emerging networking scenarios","volume":"56","author":"dainotti","year":"2012","journal-title":"Comput Netw"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22726-4_26"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.147"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033908"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-014-0008-8"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2006.12.004"},{"key":"ref62","first-page":"47","article-title":"ZMap: Fast Internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Proc USENIX SEC"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5681"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879188"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459962"},{"key":"ref65","first-page":"219","article-title":"Reverse traceroute","author":"katz-bassett","year":"2010","journal-title":"Proc USENIX NSDI"},{"key":"ref66","author":"lin","year":"2011","journal-title":"Computer Networks An Open Source Approach"},{"key":"ref67","year":"2016","journal-title":"Libpcap packet capture library"},{"key":"ref68","year":"2016","journal-title":"NetFilter"},{"key":"ref2","year":"2014","journal-title":"DDoS and Security Reports"},{"key":"ref69","year":"2017","journal-title":"Planetlab"},{"key":"ref1","year":"2014","journal-title":"2013&#x2013;2014 DDoS Threat Landscape Report"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2935634.2935636"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524507"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2022158"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.244"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885460"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.245"},{"key":"ref98","year":"2017","journal-title":"Httping"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057166"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330133"},{"key":"ref97","first-page":"7","article-title":"Sting: A TCP-based network measurement tool","author":"savage","year":"1999","journal-title":"Proc USENIX USITS"},{"key":"ref10","first-page":"174","article-title":"Resistance is not futile: Detecting ddos attacks without packet inspection","author":"athreya","year":"2013","journal-title":"Proc WISA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.I8P0308"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.75"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368594"},{"key":"ref16","author":"wang","year":"2017","journal-title":"Mitigating link-flooding attacks with active link obfuscation"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt031"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005726"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848203"},{"key":"ref84","year":"2017","journal-title":"Route Views"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0038"},{"key":"ref83","year":"2017","journal-title":"RIPE Atlas"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp078"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398817"},{"key":"ref85","year":"2017","journal-title":"traceroute"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000422"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504738"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364677"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8356020\/8315066-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8356020\/08315066.pdf?arnumber=8315066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:49Z","timestamp":1649443909000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8315066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":100,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2815555","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}