{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:18Z","timestamp":1738777218082,"version":"3.37.0"},"reference-count":12,"publisher":"Academy Publisher","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.4.874-881","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T12:49:14Z","timestamp":1396356554000},"source":"Crossref","is-referenced-by-count":1,"title":["An IP-Traceback-based Packet Filtering Scheme for Eliminating DDoS Attacks"],"prefix":"10.4304","volume":"9","author":[{"given":"Yulong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Rui","family":"Sun","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,4,1]]},"reference":[{"key":"ref1","volume-title":"Scalable multicast based filtering and tracing framework for defeating distributed DoS attack","volume":"14","author":"Lee","year":"2004","unstructured":"[5] J Lee, G de Veciana. \"Scalable multicast based filtering and tracing framework for defeating distributed DoS attack\", International Journal Of Network Management, vol. 14, 2004."},{"key":"ref2","first-page":"135","article-title":"Active internet traffic filtering: Realtime response to denial-of-service attacks","volume-title":"USENIX Annual Technical Conference General Track","author":"Argyraki","year":"2005","unstructured":"[6] K. J. Argyraki and D. R. Cheriton, \"Active internet traffic filtering: Realtime response to denial-of-service attacks,\" in USENIX Annual Technical Conference, General Track, pp. 135\u2013148, 2005."},{"key":"ref3","first-page":"15","article-title":"On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets","volume-title":"Proc of SIGCOMM 2001","author":"Park","year":"2001","unstructured":"[8] K. Park and H. Lee, \"On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets,\" in Proc. of SIGCOMM 2001, pp. 15\u201326, 2001. doi: 10. 1145\/964723. 383061"},{"key":"ref4","first-page":"1557","article-title":"SAVE: Source Address Validity Enforcement Protocol","volume-title":"Proc of INFOCOM 2002","author":"Li","year":"2007","unstructured":"[9] Jun Li, Jelena Mirkovic and Mengqiu Wang, SAVE: Source Address Validity Enforcement Protocol, in Proc. of INFOCOM 2002, pp. 1557 - 1566, 2002. doi: 10. 1016\/j. comnet. 2007. 09. 024"},{"key":"ref5","first-page":"20","article-title":"BASE: an incrementally deployable mechanism for viable IP spoofing prevention","volume-title":"Proc of ASIACCS 2007","author":"Lee","year":"2007","unstructured":"[10] H. Lee, M. Kwon, G. Hasker and A. Perrig, \"BASE: an incrementally deployable mechanism for viable IP spoofing prevention,\" in Proc. of ASIACCS 2007, pp. 20\u201331, 2007."},{"key":"ref6","first-page":"130","article-title":"SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks","volume-title":"IEEE Symposium on Security and Privacy","author":"Yaar","year":"2004","unstructured":"[11] A. Yaar, A. Perrig and D. Song, \"SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks,\" in IEEE Symposium on Security and Privacy, pp. 130\u2013143, 2004."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/347059.347560","article-title":"Practical Network Support for IP Traceback","volume-title":"Proc of ACM SIGCOMM","author":"Savage","year":"2000","unstructured":"[13] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, \"Practical Network Support for IP Traceback, \" in Proc. of ACM SIGCOMM, pp. 295\u2013396, 2000. doi: 10. 1145\/347057. 347560"},{"key":"ref8","first-page":"93","article-title":"Pi: A path identification mechanism to defend against DDoS attack","volume-title":"IEEE Symposium on Security and Privacy","author":"Yaar","year":"2003","unstructured":"[14] A. Yaar, A. Perrig, and D. X. Song, \"Pi: A path identification mechanism to defend against DDoS attack,\" in IEEE Symposium on Security and Privacy, pp. 93\u2013109, 2003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233709"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6114645"},{"key":"ref11","first-page":"878","article-title":"Advanced and authenticated marking schemes for IP traceback","volume-title":"Proc of INFOCOM 2001","volume":"2","author":"Song","year":"2001","unstructured":"[17] D. X. Song, A. Perring. Advanced and authenticated marking schemes for IP traceback, in Proc. of INFOCOM 2001, vol. 2, pp. 878-886, 2001"},{"key":"ref12","first-page":"195","article-title":"To filter or to authorize: network-layer DoS defense against multimillion-node botnets","volume-title":"Proc of SIGCOMM 2008","author":"Liu","year":"2008","unstructured":"[20] X. Liu, X. Yang, and Y. Lu, \"To filter or to authorize: network-layer DoS defense against multimillion-node botnets, \" in Proc. of SIGCOMM 2008, pp. 195\u2013206, 2008"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:37Z","timestamp":1738775137000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":12,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.4.874-881","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}