{"id":"https://openalex.org/W2152553012","doi":"https://doi.org/10.1109/glocom.2005.1577962","title":"Single packet IP traceback in AS-level partial deployment scenario","display_name":"Single packet IP traceback in AS-level partial deployment scenario","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2152553012","doi":"https://doi.org/10.1109/glocom.2005.1577962","mag":"2152553012"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2005.1577962","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2005.1577962","pdf_url":null,"source":{"id":"https://openalex.org/S4363608563","display_name":"GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071468807","display_name":"Chao Gong","orcid":"https://orcid.org/0000-0001-5126-2332"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chao Gong","raw_affiliation_strings":["Department of Computer Science, University of Texas, Dallas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, Dallas, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084479841","display_name":"Trinh Le","orcid":"https://orcid.org/0000-0002-7541-158X"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trinh Le","raw_affiliation_strings":["Department of Computer Science, University of Texas, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, San Antonio, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011209223","display_name":"Turgay Korkmaz","orcid":"https://orcid.org/0000-0002-5529-673X"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"T. Korkmaz","raw_affiliation_strings":["Department of Computer Science, University of Texas, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, San Antonio, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082680681","display_name":"K. Sarac","orcid":"https://orcid.org/0000-0001-8358-9436"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K. Sarac","raw_affiliation_strings":["Department of Computer Science, University of Texas, Dallas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, Dallas, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071468807"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8179,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.91487814,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"5 pp.","last_page":"5 pp."},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.9956268072128296},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8129564523696899},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7520973682403564},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7329671382904053},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.682188868522644},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.5585327744483948},{"id":"https://openalex.org/keywords/ip-tunnel","display_name":"IP tunnel","score":0.5435417294502258},{"id":"https://openalex.org/keywords/loose-source-routing","display_name":"Loose Source Routing","score":0.5355652570724487},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.43981102108955383},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.3564276397228241},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.35544753074645996},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3200448155403137},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.2878293991088867},{"id":"https://openalex.org/keywords/ip-address-management","display_name":"IP address management","score":0.16178783774375916},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.11769619584083557},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0697542130947113}],"concepts":[{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.9956268072128296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8129564523696899},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7520973682403564},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7329671382904053},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.682188868522644},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.5585327744483948},{"id":"https://openalex.org/C10790986","wikidata":"https://www.wikidata.org/wiki/Q442343","display_name":"IP tunnel","level":4,"score":0.5435417294502258},{"id":"https://openalex.org/C39997849","wikidata":"https://www.wikidata.org/wiki/Q6675974","display_name":"Loose Source Routing","level":5,"score":0.5355652570724487},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.43981102108955383},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.3564276397228241},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.35544753074645996},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3200448155403137},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2878293991088867},{"id":"https://openalex.org/C201980515","wikidata":"https://www.wikidata.org/wiki/Q13219707","display_name":"IP address management","level":4,"score":0.16178783774375916},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.11769619584083557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0697542130947113},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2005.1577962","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2005.1577962","pdf_url":null,"source":{"id":"https://openalex.org/S4363608563","display_name":"GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320312994","display_name":"Southwest Research Institute","ror":"https://ror.org/03tghng59"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1529231078","https://openalex.org/W1563061804","https://openalex.org/W1578138711","https://openalex.org/W1615970822","https://openalex.org/W1867219652","https://openalex.org/W1959318606","https://openalex.org/W1961994720","https://openalex.org/W2001968297","https://openalex.org/W2006616183","https://openalex.org/W2019819322","https://openalex.org/W2041784634","https://openalex.org/W2117222554","https://openalex.org/W2123845384","https://openalex.org/W2126540423","https://openalex.org/W2130208995","https://openalex.org/W2132957552","https://openalex.org/W2133703293","https://openalex.org/W2133974247","https://openalex.org/W2134054291","https://openalex.org/W2135708813","https://openalex.org/W2136090101","https://openalex.org/W2136262545","https://openalex.org/W2138723622","https://openalex.org/W2143234961","https://openalex.org/W2157157130","https://openalex.org/W2163809997","https://openalex.org/W2165780801","https://openalex.org/W2170771030","https://openalex.org/W2613051710","https://openalex.org/W3010615709","https://openalex.org/W6631781081","https://openalex.org/W6677375321","https://openalex.org/W6679234404","https://openalex.org/W6679888951","https://openalex.org/W6680237148","https://openalex.org/W6680828254"],"related_works":["https://openalex.org/W3016013868","https://openalex.org/W2808906704","https://openalex.org/W3169314715","https://openalex.org/W3120529977","https://openalex.org/W2767208794","https://openalex.org/W2152553012","https://openalex.org/W2763449180","https://openalex.org/W2093735844","https://openalex.org/W2592805739","https://openalex.org/W2102142177"],"abstract_inverted_index":{"Tracing":[0,63],"IP":[1,8,17,23,53,72,106,108,130,148,164,189],"packets":[2,29,42],"to":[3,27,58,121,126,170],"their":[4],"sources,":[5],"known":[6],"as":[7],"traceback,":[9],"is":[10,26,55,118],"an":[11],"important":[12],"task":[13],"in":[14,32,67,133,150,177,191],"defending":[15],"against":[16],"spoofing":[18],"and":[19,35],"DoS":[20],"attacks.":[21],"Log-based":[22],"traceback":[24,54,73,88,109,131,149,175,190],"technique":[25],"log":[28],"at":[30],"routers":[31],"the":[33,38,56,68,83,93,100,128,144,156,172,184],"network":[34,39],"then":[36],"determine":[37],"paths":[40],"which":[41],"traversed":[43,81],"using":[44,70],"data":[45],"extraction":[46],"techniques.":[47],"The":[48,85],"biggest":[49],"advantage":[50],"of":[51,137,146,186],"log-based":[52,71,147,163],"potential":[57],"trace":[59],"a":[60,64,134,152,168],"single":[61,65,86,153,173,187],"packet.":[62,84],"packet":[66,87,94,154,174,188],"Internet":[69],"involves":[74],"cooperation":[75],"among":[76],"all":[77,123],"autonomous":[78],"systems":[79],"(AS)":[80],"by":[82],"process":[89,176],"may":[90],"not":[91,104,119,159],"reach":[92],"origin":[95],"if":[96],"some":[97],"AS":[98,115,161],"on":[99,197],"forwarding":[101],"path":[102],"does":[103],"support":[105,127],"traceback.":[107,165],"mechanisms":[110],"are":[111],"deployed":[112],"within":[113],"each":[114],"independently.":[116],"It":[117],"reasonable":[120],"assume":[122],"ASes":[124],"begin":[125],"same":[129],"mechanism":[132],"short":[135],"period":[136],"time.":[138],"In":[139],"this":[140],"paper,":[141],"we":[142],"study":[143],"effectiveness":[145],"tracing":[151],"under":[155],"environment":[157],"where":[158],"every":[160],"supports":[162],"We":[166,182],"propose":[167],"scheme":[169,199],"conduct":[171],"AS-level":[178,192],"partial":[179,193],"deployment":[180,194],"scenario.":[181],"evaluate":[183],"performance":[185],"scenario":[195],"based":[196],"our":[198],"through":[200],"simulation.":[201]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
