{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:25:51Z","timestamp":1766136351048,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,12]],"date-time":"2007-08-12T00:00:00Z","timestamp":1186876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,12]]},"DOI":"10.1145\/1280940.1280966","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"121-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Tracing back attacks against encrypted protocols"],"prefix":"10.1145","author":[{"given":"Tarik","family":"Taleb","sequence":"first","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]},{"given":"Zubair Md.","family":"Fadlullah","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]},{"given":"Kazuo","family":"Hashimoto","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]},{"given":"Yoshiaki","family":"Nemoto","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]},{"given":"Nei","family":"Kato","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]}],"member":"320","published-online":{"date-parts":[[2007,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"French Riviera","author":"Blum A.","year":"2004","unstructured":"A. Blum , D. Song , and S. Venkataraman , \"\" Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds,\" in Proc. Recent Advance in Intrusion Detection (RAID), Sophia Antipolis , French Riviera , France , Sep. 2004 . A. Blum, D. Song, and S. Venkataraman, \"\"Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds,\" in Proc. Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, Sep. 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"ICC 2007","author":"Fadlullah Z. M.","year":"2007","unstructured":"Z. M. Fadlullah , T. Taleb , N. Ansari , K. Hashimoto , Y. Miyake , Y. Nemoto , and N. Kato ,\" Combating Attacks Against Encrypted Protocols,\" in Proc . ICC 2007 , Glasgow, Scotland , Jun. 2007 . Z. M. Fadlullah, T. Taleb, N. Ansari, K. Hashimoto, Y. Miyake, Y. Nemoto, and N. Kato,\" Combating Attacks Against Encrypted Protocols,\" in Proc. ICC 2007, Glasgow, Scotland, Jun. 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE INFOCOM","author":"Song D.","year":"2001","unstructured":"D. Song and A. Perrig , \"\" Advanced and Authenticated Marking Schemes for IP Traceback,\" in Proc . IEEE INFOCOM , Anchorage, Alaska, USA , Apr. 2001 . D. Song and A. Perrig, \"\"Advanced and Authenticated Marking Schemes for IP Traceback,\" in Proc. IEEE INFOCOM, Anchorage, Alaska, USA, Apr. 2001."},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE INFOCOM","author":"Lee W.","year":"2001","unstructured":"W. Lee and K. Park , \" On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack,\" in Proc . IEEE INFOCOM , Anchorage, Alaska, USA , Apr. 2001 . W. Lee and K. Park, \"On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack,\" in Proc. IEEE INFOCOM, Anchorage, Alaska, USA, Apr. 2001."},{"key":"e_1_3_2_1_5_1","unstructured":"S. Bellovin \"\"ICMP Traceback Messages \"\" IETF Internet Draft Mar. 2000.  S. Bellovin \"\"ICMP Traceback Messages \"\" IETF Internet Draft Mar. 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1453433"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_8_1","volume-title":"7th European Symposium on Research in Computer Security (ESORICS)","author":"Wang X.","year":"2002","unstructured":"X. Wang , D. S. Reeves , and S. F. Wu , \" Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones,\"\" in Proc . 7th European Symposium on Research in Computer Security (ESORICS) , Zurich, Switzerland , Oct. 2002 . X. Wang, D. S. Reeves, and S. F. Wu, \"Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones,\"\" in Proc. 7th European Symposium on Research in Computer Security (ESORICS), Zurich, Switzerland, Oct. 2002."},{"key":"e_1_3_2_1_9_1","volume-title":"2001 IEEE Workshop on Information Assurance and Security","author":"Lee S. C.","year":"2001","unstructured":"S. C. Lee and C. Shields , \" Tracing the Source of Network Attack: A Technical, Legal and Societal Problem,\" in Proc . 2001 IEEE Workshop on Information Assurance and Security , New York, USA , Jun. 2001 . S. C. Lee and C. Shields, \"Tracing the Source of Network Attack: A Technical, Legal and Societal Problem,\" in Proc. 2001 IEEE Workshop on Information Assurance and Security, New York, USA, Jun. 2001."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00135-3"},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"83","article-title":"ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention","volume":"11","author":"Joglekar S. P.","year":"2005","unstructured":"S. P. Joglekar and S. R. Tate , \" ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention ,\" J. Universal Computer Science (JUCS) , Vol. 11 , No. 1 , Jan. 2005 , pp. 83 -- 103 . S. P. Joglekar and S. R. Tate, \"ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention,\" J. Universal Computer Science (JUCS), Vol. 11, No. 1, Jan. 2005, pp. 83--103.","journal-title":"J. Universal Computer Science (JUCS)"},{"key":"e_1_3_2_1_12_1","volume-title":"12th USENIX Security Symposium, Washington DC, USA","author":"Brumley D.","year":"2003","unstructured":"D. Brumley and D. Boneh , \"\" Remote Timing Attacks are Practical,\" in Proc . 12th USENIX Security Symposium, Washington DC, USA , Aug. 2003 . D. Brumley and D. Boneh, \"\"Remote Timing Attacks are Practical,\" in Proc. 12th USENIX Security Symposium, Washington DC, USA, Aug. 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.03.004"},{"key":"e_1_3_2_1_14_1","unstructured":"Available at CERT \"OpenSSL servers contain a buffer overflow during the SSL2 handshake process \" CERT Vulnerability Note #102795 Jul. 2002.  Available at CERT \"OpenSSL servers contain a buffer overflow during the SSL2 handshake process \" CERT Vulnerability Note #102795 Jul. 2002."},{"key":"e_1_3_2_1_15_1","unstructured":"Available at CERT \"OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process ?\" CERT Vulnerability Note #561275 Jul. 2002.  Available at CERT \"OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process ?\" CERT Vulnerability Note #561275 Jul. 2002."},{"key":"e_1_3_2_1_16_1","first-page":"8","article-title":"Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods","volume":"85","author":"Sakaguchi K.","year":"2002","unstructured":"K. Sakaguchi , K. Ohta , Y. Waizumi , N. Kato , and Y. Nemoto , \" Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods ,\" The Transactions of IEICE B (Japanese Edition) , Vol. J 85 -B, No. 8 , 2002 , pp. 1295--1303. K. Sakaguchi, K. Ohta, Y. Waizumi, N. Kato, and Y. Nemoto, \"Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods,\" The Transactions of IEICE B (Japanese Edition), Vol. J85-B, No. 8, 2002, pp. 1295--1303.","journal-title":"The Transactions of IEICE B (Japanese Edition)"},{"key":"e_1_3_2_1_17_1","unstructured":"Network Simulator-ns(version 2). http:\/\/isl.edu\/nsnam\/ns  Network Simulator-ns(version 2). http:\/\/isl.edu\/nsnam\/ns"},{"key":"e_1_3_2_1_18_1","unstructured":"Brite. http:\/\/www.cs.bu.edu\/brite\/  Brite. http:\/\/www.cs.bu.edu\/brite\/"}],"event":{"name":"IWCMC07: International Wireless Communications and Mobile Computing Conference","sponsor":["SIGDOC ACM Special Interest Group on Systems Documentation","ACM Association for Computing Machinery","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAPP ACM Special Interest Group on Applied Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Honolulu Hawaii USA","acronym":"IWCMC07"},"container-title":["Proceedings of the 2007 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1280966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1280940.1280966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:23Z","timestamp":1750282883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1280966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,12]]},"references-count":18,"alternative-id":["10.1145\/1280940.1280966","10.1145\/1280940"],"URL":"https:\/\/doi.org\/10.1145\/1280940.1280966","relation":{},"subject":[],"published":{"date-parts":[[2007,8,12]]},"assertion":[{"value":"2007-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}