{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T22:02:23Z","timestamp":1747778543246},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,11,9]],"date-time":"2013-11-09T00:00:00Z","timestamp":1383955200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-417x-2013-5","type":"journal-article","created":{"date-parts":[[2013,11,9]],"date-time":"2013-11-09T14:01:12Z","timestamp":1384005672000},"source":"Crossref","is-referenced-by-count":13,"title":["IP traceback through (authenticated) deterministic flow marking: an empirical evaluation"],"prefix":"10.1186","volume":"2013","author":[{"given":"Vahid","family":"Aghaei-Foroushani","sequence":"first","affiliation":[]},{"given":"A Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,9]]},"reference":[{"issue":"5","key":"78_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/MCOM.2005.1453433","volume":"43","author":"Z Gao","year":"2005","unstructured":"Gao Z, Ansari N: Tracing cyber attacks from the practical perspective. IEEE Communications Magazine 2005, 43(5):123-131.","journal-title":"IEEE Communications Magazine"},{"key":"78_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/ICRTIT.2011.5972268","volume-title":"International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, 3\u20135 June 2011","author":"T Subbulakshmi","year":"2011","unstructured":"Subbulakshmi T, Guru IAA, Shalinie SM: Attack source identification at router level in real time using marking algorithm deployed in programmable routers. International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, 3\u20135 June 2011 2011, 79-84."},{"key":"78_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/SAINT.2002.994453","volume-title":"Proceedings of the 2002 Symposium on Applications and the Internet","author":"S Matsuda","year":"2002","unstructured":"Matsuda S, Baba T, Hayakawa A, Nakamura T: Design and implementation of unauthorized access tracing system. Proceedings of the 2002 Symposium on Applications and the Internet 2002, 74-81."},{"issue":"6","key":"78_CR4","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TNET.2002.804827","volume":"10","author":"AC Snoeren","year":"2002","unstructured":"Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Schwartz B, Kent ST, Strayer WT: Single-packet IP traceback. IEEE\/ACM Transactions on Networking 2002, 10(6):721-734. 10.1109\/TNET.2002.804827","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"6","key":"78_CR5","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TNET.2007.911427","volume":"16","author":"M Sung","year":"2008","unstructured":"Sung M, Li J, Xu J, Li L: Large-scale IP traceback in highspeed internet: practical techniques and theoretical foundation. IEEE\/ACM Transactions on Networking 2008, 16(6):1253-1266.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"7","key":"78_CR6","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MCOM.2003.1215651","volume":"41","author":"A Belenky","year":"2003","unstructured":"Belenky A, Ansari N: On IP traceback. IEEE Communications Magazine 2003, 41(7):142-153. 10.1109\/MCOM.2003.1215651","journal-title":"IEEE Communications Magazine"},{"key":"78_CR7","volume-title":"IETF Draft on ICMP traceback messages","author":"S Bellovinm","year":"2000","unstructured":"Bellovinm S: IETF Draft on ICMP traceback messages. March 2000 http:\/\/tools.ietf.org\/html\/draft-bellovin-itrace-00"},{"issue":"3","key":"78_CR8","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S Savage","year":"2001","unstructured":"Savage S, Wetherall D, Karlin A, Anderson T: Practical network support for IP traceback. IEEE\/ACM Transactions on Networking 2001, 9(3):226-237. 10.1109\/90.929847","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"78_CR9","first-page":"732","volume":"51","author":"Z Gao","year":"2007","unstructured":"Gao Z, Ansari N: A practical and robust inter-domain marking scheme for IP traceback. The International Journal of Computer and Telecommunications Networking 2007, 51(3):732-750.","journal-title":"The International Journal of Computer and Telecommunications Networking"},{"key":"78_CR10","first-page":"159","volume-title":"Tenth International Conference on Computer Communications and Networks","author":"A Mankin","year":"2001","unstructured":"Mankin A, Massey D, Wu C, Wu SF, Zhang L: On design and evaluation of intention-driven, \"Intention-Drive\" ICMP Traceback. Tenth International Conference on Computer Communications and Networks 2001, 159-165."},{"issue":"3","key":"78_CR11","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S Savage","year":"2001","unstructured":"Savage S, Karlin A, Wetherall D, Anderson T: Network support for IP traceback. IEEE\/ACM Transactions on Networking, 2001, 9(3):226-237. 10.1109\/90.929847","journal-title":"IEEE\/ACM Transactions on Networking,"},{"issue":"2","key":"78_CR12","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/505586.505588","volume":"5","author":"D Dean","year":"2002","unstructured":"Dean D, Franklin M, Stubblefield A: An algebraic approach to IP traceback. ACM Transactions on Information and System Security (TISSEC) 2002, 5(2):119-137. 10.1145\/505586.505588","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"78_CR13","first-page":"878","volume":"2","author":"DX Song","year":"2001","unstructured":"Song DX, Perrig A: Advanced and authenticated marking schemes for IP traceback. IEEE Computer and Communications INFOCOM 2001, 2: 878-886.","journal-title":"IEEE Computer and Communications INFOCOM"},{"key":"78_CR14","first-page":"184","volume-title":"Proceedings of the 7th ACM Conference on Computer and Communications Security CCS","author":"TW Doeppner","year":"2000","unstructured":"Doeppner TW, Klein P, Koyfman A: Using router stamping to identify the source of IP packets. Proceedings of the 7th ACM Conference on Computer and Communications Security CCS 2000, 184-189."},{"issue":"6","key":"78_CR15","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/LCOMM.2004.831336","volume":"8","author":"Y Tseng","year":"2004","unstructured":"Tseng Y, Chen H, Hsieh W: Probabilistic packet marking with non-preemptive compensation. IEEE Communications Letters 2004, 8(6):359-361. 10.1109\/LCOMM.2004.831336","journal-title":"IEEE Communications Letters"},{"key":"78_CR16","first-page":"93","volume-title":"Proceedings of Symposium on Security and Privacy","author":"A Yaar","year":"2003","unstructured":"Yaar A, Perrig A, Song D: Pi: a path identification mechanism to defend against DDoS attacks. Proceedings of Symposium on Security and Privacy 2003, 93-107."},{"key":"78_CR17","first-page":"1395","volume":"2","author":"A Yaar","year":"2005","unstructured":"Yaar A, Perrig A, Song D: FIT: fast Internet traceback. IEEE Computer and Communications INFOCOM 2005, 2: 1395-1406.","journal-title":"IEEE Computer and Communications INFOCOM"},{"key":"78_CR18","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/586110.586128","volume-title":"Proceedings of the 9th ACM conference on Computer and communications security","author":"M Goodrich","year":"2002","unstructured":"Goodrich M: Efficient packet marking for large-scale IP traceback. Proceedings of the 9th ACM conference on Computer and communications security 2002, 117-126."},{"issue":"4","key":"78_CR19","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/LCOMM.2003.811200","volume":"7","author":"A Belenky","year":"2003","unstructured":"Belenky A, Ansari N: IP traceback with deterministic packet marking. IEEE communication letters 2003, 7(4):162-164.","journal-title":"IEEE communication letters"},{"issue":"10","key":"78_CR20","first-page":"2677","volume":"51","author":"A Belenky","year":"2007","unstructured":"Belenky A, Ansari N: On deterministic packet marking. The International Journal of Computer and Telecommunications Networking Computer Networks 2007, 51(10):2677-2700.","journal-title":"The International Journal of Computer and Telecommunications Networking Computer Networks"},{"issue":"2","key":"78_CR21","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2011.2169960","volume":"7","author":"M Yang","year":"2012","unstructured":"Yang M: RIHT: a novel hybrid ip traceback scheme. IEEE Transactions on Information Forensics and Security 2012, 7(2):789-797.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"78_CR22","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-30555-2_47","volume-title":"Proceedings of the First international conference on Distributed Computing and Internet Technology ICDCIT","author":"SK Rayanchu","year":"2004","unstructured":"Rayanchu SK, Barua G: Tracing attackers with Deterministic Edge Router Marking (DERM). Proceedings of the First international conference on Distributed Computing and Internet Technology ICDCIT 2004, 400-409."},{"key":"78_CR23","first-page":"1","volume-title":"IEEE International Conference on Communications (ICC)","author":"MDD Moreira","year":"2011","unstructured":"Moreira MDD, Fernandes NC, Laufer RP, Duarte OCMB: A stateless traceback technique for identifying the origin of attacks from a single packet. IEEE International Conference on Communications (ICC) 2011, 1-6."},{"issue":"7","key":"78_CR24","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/LCOMM.2012.051512.120467","volume":"16","author":"T Hongcheng","year":"2012","unstructured":"Hongcheng T, Jun B: An incrementally deployable flow-based scheme for IP traceback. IEEE communication letters 2012, 16(7):1140-1143.","journal-title":"IEEE communication letters"},{"key":"78_CR25","first-page":"369","volume-title":"Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge","author":"X Wang","year":"2001","unstructured":"Wang X, Wu SF, Yuill J, Reeves DS: Sleepy watermark tracing: an active network-based intrusion response framework. In Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge. Paris; 11\u201313 June 2001:369-385."},{"key":"78_CR26","volume-title":"The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA)","author":"V Aghaei-Foroushani","year":"2013","unstructured":"Aghaei-Foroushani V, Zincir-Heywood N: Deterministic and authenticated flow marking for IP traceback. In The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA). Barcelona; 25\u201328 March 2013."},{"key":"78_CR27","first-page":"127","volume-title":"IEEE International Workshop on Cyber Crime (IWCC 2013)","author":"V Aghaei-Foroushani","year":"2013","unstructured":"Aghaei-Foroushani V, Zincir-Heywood N: On evaluating IP traceback schemes: a practical perspective. In IEEE International Workshop on Cyber Crime (IWCC 2013). San Francisco; 13\u201324 May 2013:127-134."},{"key":"78_CR28","unstructured":"Burch H, Cheswick B: Tracing anonymous packets to their approximate source. Proceedings of the 14th USENIX Conference on System Administration LISA 319-327."},{"key":"78_CR29","first-page":"338","volume":"1","author":"K Park","year":"2001","unstructured":"Park K, Lee H: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. IEEE Computer and Communications INFOCOM 2001, 1: 338-347.","journal-title":"IEEE Computer and Communications INFOCOM"},{"key":"78_CR30","unstructured":"Wei D, Ansari N: Implementing IP traceback in the Internet: an ISP perspective. Proceedings of 3rd Annual IEEE Workshop on Information Assurance, (2002) 326-332."},{"key":"78_CR31","first-page":"1","volume":"2","author":"R Shokri","year":"2006","unstructured":"Shokri R, Mohammadi H, Yazdani N, Varshovi A, Sadeghian B: DDPM: dynamic deterministic packet marking for IP traceback. 14th IEEE International Conference on Networks ICON 2006, 2: 1-6.","journal-title":"14th IEEE International Conference on Networks ICON"},{"issue":"6","key":"78_CR32","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R Alshammari","year":"2011","unstructured":"Alshammari R, Zincir-Heywood AN: Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Elsevier Computer Networks 2011, 55(6):1326-1350. 10.1016\/j.comnet.2010.12.002","journal-title":"Elsevier Computer Networks"},{"key":"78_CR33","unstructured":"DARPA 1999 intrusion detection data sets . Accessed 25 October 2013 http:\/\/www.ll.mit.edu\/mission\/communications\/cyber\/CSTcorpora\/ideval\/data\/"},{"key":"78_CR34","unstructured":"The CAIDA anonymized Internet traces 2012 dataset . Accessed 25 October 2013 http:\/\/www.caida.org\/data\/passive\/{passive}_2012_dataset.xml"},{"key":"78_CR35","unstructured":"MAWI Working Group: MAWI (Measurement and Analysis on the WIDE Internet) traffic archive. . Accessed 25 October 2013 http:\/\/mawi.wide.ad.jp\/mawi\/"},{"key":"78_CR36","unstructured":"Turner A: Tcpreplay suite. . Accessed 25 October 2013 http:\/\/tcpreplay.synfin.net\/"},{"key":"78_CR37","unstructured":"Riverbed Technology: Winpcap, The industry-standard windows packet capture library. . Accessed 25 October 2013 http:\/\/www.winpcap.org\/"},{"key":"78_CR38","unstructured":"Johnson D, Menezes A, Vanstone S: The Elliptic Curve Digital Signature Algorithm (ECDSA).. Accessed 25 October 2013 http:\/\/cs.ucsb.edu\/~koc\/ccs130h\/notes\/ecdsa-cert.pdf . Accessed 25 October 2013"},{"key":"78_CR39","unstructured":"National Security Agency\/CentralSecurityService(NSA\/CSS): The case for Elliptic Curve Cryptography. . Accessed 25 October 2013 http:\/\/www.nsa.gov\/business\/programs\/elliptic_curve.shtml"},{"key":"78_CR40","unstructured":"Dai Wen: Crypto++ library of cryptographic schemes. . Accessed 25 October 2013 http:\/\/www.cryptopp.com\/"},{"key":"78_CR41","volume-title":"New Horizons in, Mobile and Wireless Communications: Networks, Services, and Applications","author":"R Prasad","year":"2009","unstructured":"Prasad R, Mihovska A: New Horizons in, Mobile and Wireless Communications: Networks, Services, and Applications. London: Artech House; 2009."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-417X-2013-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-417X-2013-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-417X-2013-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T23:41:44Z","timestamp":1647042104000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-417X-2013-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,9]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["78"],"URL":"https:\/\/doi.org\/10.1186\/1687-417x-2013-5","relation":{},"ISSN":["1687-417X"],"issn-type":[{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,9]]},"article-number":"5"}}