{"id":"https://openalex.org/W2208375356","doi":"https://doi.org/10.1109/cnsm.2015.7367370","title":"Deterministic flow marking for IPv6 traceback (DFM6)","display_name":"Deterministic flow marking for IPv6 traceback (DFM6)","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2208375356","doi":"https://doi.org/10.1109/cnsm.2015.7367370","mag":"2208375356"},"language":"en","primary_location":{"id":"doi:10.1109/cnsm.2015.7367370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnsm.2015.7367370","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055532343","display_name":"Vahid Aghaei-Foroushani","orcid":null},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Vahid Aghaei-Foroushani","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008462534","display_name":"A. Nur Zincir\u2010Heywood","orcid":"https://orcid.org/0000-0003-2796-7265"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"A. Nur Zincir-Heywood","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055532343"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66566351,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5","issue":null,"first_page":"270","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.947270393371582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7597854137420654},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.7495930790901184},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6572611331939697},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.6282485723495483},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5707089304924011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5415483117103577},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5413004159927368},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5208447575569153},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.47560960054397583},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3036908805370331}],"concepts":[{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.947270393371582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7597854137420654},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.7495930790901184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6572611331939697},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.6282485723495483},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5707089304924011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5415483117103577},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5413004159927368},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5208447575569153},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.47560960054397583},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3036908805370331},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnsm.2015.7367370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnsm.2015.7367370","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1977467230","https://openalex.org/W1997544000","https://openalex.org/W2070615101","https://openalex.org/W2081326724","https://openalex.org/W2090583939","https://openalex.org/W2142935497","https://openalex.org/W2142941871","https://openalex.org/W2147088226","https://openalex.org/W2325592961"],"related_works":["https://openalex.org/W2170470865","https://openalex.org/W2167302331","https://openalex.org/W2127772962","https://openalex.org/W1493760256","https://openalex.org/W2359167911","https://openalex.org/W2342208107","https://openalex.org/W2791075267","https://openalex.org/W2151002785","https://openalex.org/W2353701916","https://openalex.org/W2199179552"],"abstract_inverted_index":{"Although":[0],"some":[1],"security":[2,59],"threats":[3],"were":[4],"taken":[5],"into":[6],"consideration":[7],"in":[8,16,115],"the":[9,17,25,31,37,51,58,61,68,76,87,97,104,124,127,132,145],"IPv6":[10,18,62,88,105,128],"design,":[11],"DDoS":[12,26],"attacks":[13,27],"still":[14],"exist":[15],"networks.":[19,63,89],"The":[20],"main":[21],"difficulty":[22],"to":[23,29,45,57,82,122,143],"counter":[24],"is":[28,109],"trace":[30],"source":[32,42],"of":[33,60,67,96,119,126,140,147],"such":[34],"attacks,":[35],"as":[36],"attackers":[38],"often":[39],"use":[40],"spoofed":[41],"IP":[43,52,70],"addresses":[44],"hide":[46],"their":[47],"identity.":[48],"This":[49],"makes":[50],"traceback":[53,71,148,151],"schemes":[54],"very":[55],"relevant":[56],"Given":[64],"that":[65],"most":[66],"current":[69],"approaches":[72],"are":[73,79],"based":[74],"on":[75,86],"IPv4,":[77],"they":[78],"not":[80],"suitable":[81],"be":[83],"applied":[84],"directly":[85],"In":[90],"this":[91],"research,":[92],"a":[93,113,137],"modified":[94],"version":[95],"Deterministic":[98],"Flow":[99],"Marking":[100],"(DFM)":[101],"approach":[102],"for":[103],"networks,":[106],"called":[107],"DFM6,":[108],"presented.":[110],"DFM6":[111,134],"embeds":[112],"fingerprint":[114],"only":[116,136],"one":[117],"packet":[118],"each":[120],"flow":[121],"identify":[123],"origin":[125],"traffic":[129],"traversing":[130],"through":[131],"network.":[133],"requires":[135],"small":[138],"amount":[139],"marked":[141],"packets":[142],"complete":[144],"process":[146],"with":[149],"high":[150],"rate":[152],"and":[153],"no":[154],"false":[155],"positives.":[156]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
