{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:47Z","timestamp":1750307747881,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,31]],"date-time":"2008-03-31T00:00:00Z","timestamp":1206921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,31]]},"DOI":"10.1145\/1355284.1355286","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T13:06:52Z","timestamp":1223384812000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Logging based IP Traceback in switched ethernets"],"prefix":"10.1145","author":[{"given":"Marios S.","family":"Andreou","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, U.K."}]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, U.K."}]}],"member":"320","published-online":{"date-parts":[[2008,3,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/827275.829387"},{"issue":"11","key":"e_1_3_2_1_2_1","volume":"86","author":"Hazeyama H.","year":"2003","unstructured":"Hazeyama , H. , Oe , M. , Kadobayashi , Y. : A Layer -2 Extension to Hash Based IP Traceback , IEICE Transactions on Information and Systems , Vol. E86 ( 11 ), ( 2003 ), 2325 Hazeyama, H., Oe, M., Kadobayashi, Y.: A Layer-2 Extension to Hash Based IP Traceback, IEICE Transactions on Information and Systems, Vol. E86(11), (2003), 2325","journal-title":"IEICE Transactions on Information and Systems"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1045502.1045544"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"e_1_3_2_1_6_1","volume-title":"9th USENIX Security Symposium","author":"Stone R.","year":"2000","unstructured":"Stone , R. : Centertrack: An IP Overlay Network for Tracking DoS Floods , 9th USENIX Security Symposium , ( 2000 ) Stone, R.: Centertrack: An IP Overlay Network for Tracking DoS Floods, 9th USENIX Security Symposium, (2000)"},{"key":"e_1_3_2_1_7_1","volume-title":"Taylor","author":"Bellovin S.","year":"2003","unstructured":"Bellovin , S. , Leech , M. , Taylor , T. : ICMP Traceback Messages, Internet Draft, IETF , ( 2003 ) Bellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages, Internet Draft, IETF, (2003)"},{"key":"e_1_3_2_1_8_1","volume-title":"Reiher","author":"Mirkovic J.","year":"2005","unstructured":"Mirkovic , J. , Dietrich , S. , Dittrich , D. , Reiher , P. : Internet Denial of Service (Attack and Defense Mechanisms), Prentice Hall , ( 2005 ) Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service (Attack and Defense Mechanisms), Prentice Hall, (2005)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2007.4295996"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884246"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2007.4313215"},{"key":"e_1_3_2_1_12_1","volume-title":"Council Directive 2006\/24\/EC of","author":"European Parliament","year":"2006","unstructured":"European Parliament : Council Directive 2006\/24\/EC of 15 March 2006 on the retention of data, OJ L 105, (March 2006), 54--63 European Parliament: Council Directive 2006\/24\/EC of 15 March 2006 on the retention of data, OJ L105, (March 2006), 54--63"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_1_15_1","unstructured":"'m3lt': The LAND Attack (IP DoS) http:\/\/www.insecure.org\/sploits\/land.ip.DOS.html (1997)  'm3lt': The LAND Attack (IP DoS) http:\/\/www.insecure.org\/sploits\/land.ip.DOS.html (1997)"},{"key":"e_1_3_2_1_16_1","unstructured":"'Tfreak': Smurf multi broadcast ICMP attack http:\/\/seclists.org\/lists\/bugtraq\/1997\/Oct\/0066.html (1997)  'Tfreak': Smurf multi broadcast ICMP attack http:\/\/seclists.org\/lists\/bugtraq\/1997\/Oct\/0066.html (1997)"},{"key":"e_1_3_2_1_17_1","unstructured":"Spurgeon C.: Broadcast Storms and Packet Avalanches on Campus Networks http:\/\/madhaus.utcs.utoronto.ca\/cns\/ftp\/doc\/introductory_documents\/storms.txt (1989)  Spurgeon C.: Broadcast Storms and Packet Avalanches on Campus Networks http:\/\/madhaus.utcs.utoronto.ca\/cns\/ftp\/doc\/introductory_documents\/storms.txt (1989)"},{"key":"e_1_3_2_1_18_1","unstructured":"Sanfillipo S.: New TCP Scan Method http:\/\/seclists.org\/lists\/bugtraq\/1998\/Dec\/0079.html (1998)  Sanfillipo S.: New TCP Scan Method http:\/\/seclists.org\/lists\/bugtraq\/1998\/Dec\/0079.html (1998)"},{"key":"e_1_3_2_1_19_1","unstructured":"BBN Technologies: Source Path Isolation Engine http:\/\/www.ir.bbn.com\/projects\/SPIE\/spiehome.html (2004)  BBN Technologies: Source Path Isolation Engine http:\/\/www.ir.bbn.com\/projects\/SPIE\/spiehome.html (2004)"},{"key":"e_1_3_2_1_20_1","volume-title":"Romanascanu","author":"Waterman R.","year":"1999","unstructured":"Waterman , R. , Lahaye , B. , Romanascanu , D. : Remote Network Monitoring MIB Extensions for Switched Networks, IETF Request for Comments 2613, http:\/\/www.ietf.org\/rfc.html, ( 1999 ) Waterman, R., Lahaye, B., Romanascanu, D.: Remote Network Monitoring MIB Extensions for Switched Networks, IETF Request for Comments 2613, http:\/\/www.ietf.org\/rfc.html, (1999)"},{"key":"e_1_3_2_1_21_1","unstructured":"Sourcefire: Snort - the de facto Standard for Instrusion Detection\/Prevention http:\/\/www.snort.org\/ (2007)  Sourcefire: Snort - the de facto Standard for Instrusion Detection\/Prevention http:\/\/www.snort.org\/ (2007)"},{"key":"e_1_3_2_1_22_1","volume-title":"Corbet","author":"Rubini A.","year":"2001","unstructured":"Rubini , A. , Corbet , J. : Linux Device Drivers, O'Reilly , ( 2001 ) Rubini, A., Corbet, J.: Linux Device Drivers, O'Reilly, (2001)"},{"key":"e_1_3_2_1_23_1","volume-title":"The Switch Book: The Complete Guide to LAN Switching Technology","author":"Seifert R.","year":"2000","unstructured":"Seifert , R. : The Switch Book: The Complete Guide to LAN Switching Technology , Wiley , ( 2000 ) Seifert, R.: The Switch Book: The Complete Guide to LAN Switching Technology, Wiley, (2000)"},{"key":"e_1_3_2_1_24_1","unstructured":"Manolios P.: Bloom Filter Calculator http:\/\/www.cc.gatech.edu\/fac\/Pete.Manolios\/bloom-filters\/calculator.html (2004)  Manolios P.: Bloom Filter Calculator http:\/\/www.cc.gatech.edu\/fac\/Pete.Manolios\/bloom-filters\/calculator.html (2004)"}],"event":{"name":"Eurosys '08: Eurosys 2008 Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Glasgow Scotland","acronym":"Eurosys '08"},"container-title":["Proceedings of the 1st European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1355284.1355286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1355284.1355286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:08Z","timestamp":1750253948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1355284.1355286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,31]]},"references-count":23,"alternative-id":["10.1145\/1355284.1355286","10.1145\/1355284"],"URL":"https:\/\/doi.org\/10.1145\/1355284.1355286","relation":{},"subject":[],"published":{"date-parts":[[2008,3,31]]},"assertion":[{"value":"2008-03-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}