{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:08:36Z","timestamp":1704931716734},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transcom.2015ebp3457","type":"journal-article","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T23:07:51Z","timestamp":1467328071000},"page":"1511-1522","source":"Crossref","is-referenced-by-count":1,"title":["Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach"],"prefix":"10.23919","volume":"E99.B","author":[{"given":"Tae Hwan","family":"KIM","sequence":"first","affiliation":[{"name":"Electronics and Telecommunications Research Institute"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong Seong","family":"KIM","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, the University of Canterbury"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hee Young","family":"JUNG","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M. Baskar, T. Gnanasekaran, and S. Saravanan, \u201cAdaptive IP traceback mechanism for detecting low rate DDoS attacks,\u201d 2013 IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), pp.373-377, 2013.","DOI":"10.1109\/ICE-CCN.2013.6528526"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] R. Beverly, A. Berger, Y. Hyun, and K. Claffy, \u201cUnderstanding the efficacy of deployed internet source address validation filtering,\u201d Proc. 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC&apos;09, pp.356-369, 2009.","DOI":"10.1145\/1644893.1644936"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] H. Choi, H. Lee, and H. Kim, \u201cFast detection and visualization of network attacks on parallel coordinates,\u201d Comput. Secur., vol.28, no.5, pp.276-288, 2009.","DOI":"10.1016\/j.cose.2008.12.003"},{"key":"4","unstructured":"[4] A. Fei, G. Pei, R. Liu, and L. Zhang, \u201cMeasurements on delay and hop-count of the Internet,\u201d IEEE GLOBECOM, 1998."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] P. Ferguson and D. Senie, \u201cNetwork ingress filtering: Defeating denial of service attacks which employ IP source address spoofing,\u201d RFC 2827, 2000.","DOI":"10.17487\/rfc2827"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R. Fontugne and K. Fukuda, \u201cA hough-transform-based anomaly detector with an adaptive time interval,\u201d SIGAPP Appl. Comput. Rev., vol.11, no.3, pp.41-51, 2011.","DOI":"10.1145\/2034594.2034598"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] V.A. Foroushani and A.N. Zincir-Heywood, \u201cDeterministic and authenticated flow marking for IP traceback,\u201d 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp.397-404, 2013.","DOI":"10.1109\/AINA.2013.60"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] H. Goto and T. Takada, \u201cAnomalous network communication detection system by visual pattern on a client computer,\u201d Proc. 30th Annual ACM Symposium on Applied Computing, SAC&apos;15, pp.1263-1269, 2015.","DOI":"10.1145\/2695664.2695864"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Q. Gu and P. Liu, \u201cDenial of service attacks,\u201d Technical Report, http:\/\/s2.ist.psu.edu\/paper\/DDoS-Chap-Gu-June-07.pdf, 2012.","DOI":"10.1002\/9781118256107.ch29"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] M. Hamedi-Hamzehkolaie, M.J. Shamani, and M.B. Ghaznavi-Ghoushchi, \u201cLow rate DOS traceback based on sum of flows,\u201d 6th International Symposium on Telecommunications (IST), pp.1142-1146, 2012.","DOI":"10.1109\/ISTEL.2012.6483158"},{"key":"11","unstructured":"[11] KK. Jena, \u201cApplication of a nobel approach for edge detection of images,\u201d J. Image Processing and Artificial Intelligence, vol.1, no.1, 2015."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] H. Kim, I. Kang, and S. Bahk, \u201cReal-time visualization of network attacks on high-speed links,\u201d IEEE Netw., vol.18, no.5, pp.30-39, 2004.","DOI":"10.1109\/MNET.2004.1337733"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] S.S. Kim and A.L.N. Reddy, \u201cImage-based anomaly detection technique: Algorithm, implementation and effectiveness,\u201d IEEE J. Sel. Areas. Commun., vol.24, no.10, pp.1942-1954, 2006.","DOI":"10.1109\/JSAC.2006.877215"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] S.S. Kim, A.L.N. Reddy, and M. Vannucci, \u201cDetecting traffic anomalies through aggregate analysis of packet header data,\u201d NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, Lecture Notes in Computer Science, vol.3042, pp.1047-1059, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004.","DOI":"10.1007\/978-3-540-24693-0_86"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] T.H. Kim, D.S. Kim, S.M. Lee, and J.S. Park, \u201cDetecting DDoS attacks using dispersible traffic matrix and weighted moving average,\u201d Advances in Information Security and Assurance, Lecture Notes in Computer Science, vol.5576, pp.290-300, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.","DOI":"10.1007\/978-3-642-02617-1_30"},{"key":"16","unstructured":"[16] J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall, 2005."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] J. Mirkovic and E. Kissel, \u201cComparative evaluation of spoofing defenses,\u201d IEEE Trans. Dependable and Secure Comput., vol.8, no.2, pp.218-232, 2011.","DOI":"10.1109\/TDSC.2009.44"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard, M. Berg, and R. Jung, \u201cTesting a collaborative DDoS defense in a red team\/blue team exercise,\u201d IEEE Trans. Comput., vol.57, no.8, pp.1098-1112, 2008.","DOI":"10.1109\/TC.2008.42"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] A. Mukaddam, I. Elhajj, A. Kayssi, and A. Chehab, \u201cIP spoofing detection using modified hop count,\u201d 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp.512-516, 2014.","DOI":"10.1109\/AINA.2014.62"},{"key":"20","unstructured":"[20] M. Muthusrinivasan, A composable approach to design of newer techniques for large-scale denial-of-service attack attribution, Ph.D. Thesis, Iowa State University, 2011."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] P. Sattari, M. Gjoka, and A. Markopoulou, \u201cA network coding approach to IP traceback,\u201d 2010 IEEE International Symposium on Network Coding (NetCod), pp.1-6, 2010.","DOI":"10.1109\/NETCOD.2010.5487682"},{"key":"22","unstructured":"[22] The IPv4 Routed \/24 Topology Dataset, Available at: http:\/\/www.caida.org\/data\/active\/ipv4_routed_24_topology_dataset.xml"},{"key":"23","unstructured":"[23] The IPv6 Topology Dataset, Available at: http:\/\/www.caida.org\/data\/active\/ipv6_allpref_topology_dataset.xml"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] M. Vijayalakshmi, N. Nithya, and S.M. Shalinie, \u201cA novel algorithm on IP traceback to find the real source of spoofed IP packets,\u201d Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Advances in Intelligent Systems and Computing, vol.325, pp.79-87, Springer India, New Delhi, 2015.","DOI":"10.1007\/978-81-322-2135-7_10"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] M.-H. Yang and M.-C. Yang, \u201cRIHT: A novel hybrid IP traceback scheme,\u201d IEEE Trans. Inform. Forensic Secur., vol.7, no.2, pp.789-797, 2012.","DOI":"10.1109\/TIFS.2011.2169960"},{"key":"26","unstructured":"[26] D. Ziou and S. Tabbone, \u201cEdge detection techniques \u2014 An overview,\u201d J. Pattern Recognition and Image Analysis, vol.8, no.4, 1998."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E99.B\/7\/E99.B_2015EBP3457\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:59:45Z","timestamp":1704898785000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E99.B\/7\/E99.B_2015EBP3457\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2015ebp3457","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}