{"id":"https://openalex.org/W2914876907","doi":"https://doi.org/10.1109/iwqos.2018.8624169","title":"Enabling Efficient Source and Path Verification via Probabilistic Packet Marking","display_name":"Enabling Efficient Source and Path Verification via Probabilistic Packet Marking","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2914876907","doi":"https://doi.org/10.1109/iwqos.2018.8624169","mag":"2914876907"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos.2018.8624169","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2018.8624169","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101979307","display_name":"Bo Wu","orcid":"https://orcid.org/0000-0003-0695-019X"},"institutions":[{"id":"https://openalex.org/I29955533","display_name":"Center for Information Technology","ror":"https://ror.org/03jh5a977","country_code":"US","type":"facility","lineage":["https://openalex.org/I1299022934","https://openalex.org/I1299303238","https://openalex.org/I29955533"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bo Wu","raw_affiliation_strings":["Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I29955533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665814","display_name":"Ke Xu","orcid":"https://orcid.org/0000-0003-2587-8517"},"institutions":[{"id":"https://openalex.org/I29955533","display_name":"Center for Information Technology","ror":"https://ror.org/03jh5a977","country_code":"US","type":"facility","lineage":["https://openalex.org/I1299022934","https://openalex.org/I1299303238","https://openalex.org/I29955533"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ke Xu","raw_affiliation_strings":["Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I29955533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I29955533","display_name":"Center for Information Technology","ror":"https://ror.org/03jh5a977","country_code":"US","type":"facility","lineage":["https://openalex.org/I1299022934","https://openalex.org/I1299303238","https://openalex.org/I29955533"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I29955533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045206037","display_name":"Zhuotao Liu","orcid":"https://orcid.org/0000-0002-7532-0434"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhuotao Liu","raw_affiliation_strings":["Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, Illinois, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, Illinois, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019677106","display_name":"Yih\u2010Chun Hu","orcid":"https://orcid.org/0000-0002-7829-3929"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yih-Chun Hu","raw_affiliation_strings":["Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, Illinois, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, Illinois, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048860833","display_name":"Martin J. Reed","orcid":"https://orcid.org/0000-0002-6708-4478"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Martin J. Reed","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Shen","raw_affiliation_strings":["School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057339400","display_name":"Fan Yang","orcid":"https://orcid.org/0000-0002-4437-8027"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Yang","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101979307"],"corresponding_institution_ids":["https://openalex.org/I29955533"],"apc_list":null,"apc_paid":null,"fwci":2.5835,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.9089914,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8417798280715942},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7938991785049438},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7057970762252808},{"id":"https://openalex.org/keywords/packet-forwarding","display_name":"Packet forwarding","score":0.6704772114753723},{"id":"https://openalex.org/keywords/goodput","display_name":"Goodput","score":0.6545775532722473},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.5729332566261292},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4406885802745819},{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.4315420687198639},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.42664748430252075},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.38189220428466797},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3496784567832947},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.26511871814727783},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.14562004804611206},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12308865785598755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8417798280715942},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7938991785049438},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7057970762252808},{"id":"https://openalex.org/C120317029","wikidata":"https://www.wikidata.org/wiki/Q874048","display_name":"Packet forwarding","level":3,"score":0.6704772114753723},{"id":"https://openalex.org/C94022561","wikidata":"https://www.wikidata.org/wiki/Q1172393","display_name":"Goodput","level":4,"score":0.6545775532722473},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.5729332566261292},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4406885802745819},{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.4315420687198639},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.42664748430252075},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.38189220428466797},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3496784567832947},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26511871814727783},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.14562004804611206},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12308865785598755},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos.2018.8624169","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2018.8624169","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W200599792","https://openalex.org/W1494011945","https://openalex.org/W1542309073","https://openalex.org/W1566845903","https://openalex.org/W1575519872","https://openalex.org/W1601814439","https://openalex.org/W1625214948","https://openalex.org/W1936523258","https://openalex.org/W2003590000","https://openalex.org/W2006435204","https://openalex.org/W2010787569","https://openalex.org/W2018505857","https://openalex.org/W2037889593","https://openalex.org/W2045594157","https://openalex.org/W2099995703","https://openalex.org/W2129909248","https://openalex.org/W2136262545","https://openalex.org/W2138370688","https://openalex.org/W2142941871","https://openalex.org/W2156874421","https://openalex.org/W2162732505","https://openalex.org/W2170771030","https://openalex.org/W2277140271","https://openalex.org/W2296143987","https://openalex.org/W2395660260","https://openalex.org/W2511521491","https://openalex.org/W2535001381","https://openalex.org/W2559645321","https://openalex.org/W2770638201","https://openalex.org/W2786173403","https://openalex.org/W2963320092","https://openalex.org/W4234335113","https://openalex.org/W6608218161","https://openalex.org/W6632531112","https://openalex.org/W6636017267","https://openalex.org/W6694408619","https://openalex.org/W6712259822","https://openalex.org/W6725191254"],"related_works":["https://openalex.org/W2736824533","https://openalex.org/W2401114710","https://openalex.org/W2499883480","https://openalex.org/W2123632139","https://openalex.org/W2130480290","https://openalex.org/W2510731853","https://openalex.org/W2127130002","https://openalex.org/W2131896068","https://openalex.org/W2113656557","https://openalex.org/W2266684008"],"abstract_inverted_index":{"The":[0,177],"Internet":[1],"lacks":[2],"verification":[3,43,97],"of":[4,57,122,185,197],"source":[5,28,40,106],"authenticity":[6],"and":[7,16,30,41,50,79,107,162,165,183,194,200,205],"path":[8,42],"compliance":[9],"between":[10],"the":[11,17,58,71,84,152,175,181,192,195],"planned":[12],"packet":[13,53,85,95,105,117,139,147,153],"delivery":[14,19,86],"paths":[15,110,149],"real":[18,112,167,171],"paths,":[20],"which":[21,82,103],"allows":[22],"attackers":[23],"to":[24,38,46,69],"construct":[25],"attacks":[26],"like":[27],"spoofing":[29],"traffic":[31],"hijacking":[32],"attacks.":[33],"Thus,":[34,126],"it":[35,127,137],"is":[36],"essential":[37],"enable":[39],"in":[44,111,119,159,169],"networks":[45],"detect":[47],"forwarding":[48,96,109,131,140,148,198],"anomalies":[49,65,132],"ensure":[51],"correct":[52],"delivery.":[54],"However,":[55],"most":[56],"existing":[59],"security":[60],"mechanisms":[61],"can":[62,128],"only":[63],"capture":[64],"but":[66],"are":[67],"unable":[68],"locate":[70],"detected":[72],"anomalies.":[73],"Besides,":[74],"they":[75],"incur":[76],"significant":[77],"computation":[78],"communication":[80],"overhead,":[81],"exacerbates":[83],"performance.":[87],"In":[88,187],"this":[89],"paper,":[90],"we":[91],"propose":[92],"a":[93,170],"high-efficient":[94],"mechanism":[98],"called":[99],"PPV":[100,114,157,189],"for":[101],"networks,":[102],"verifies":[104],"their":[108],"time.":[113],"enables":[115],"probabilistic":[116],"marking":[118],"routers":[120,161],"instead":[121],"verifying":[123,134],"all":[124],"packets.":[125],"efficiently":[129],"identify":[130],"by":[133,145],"markings.":[135,154],"Moreover,":[136],"localizes":[138],"anomalies,":[141],"e.g.,":[142],"malicious":[143],"routers,":[144],"reconstructing":[146],"based":[150],"on":[151],"We":[155],"implement":[156],"prototype":[158],"Click":[160],"commodity":[163],"servers,":[164],"conducts":[166],"experiments":[168],"testbed":[172],"built":[173],"upon":[174],"prototype.":[176],"experimental":[178],"results":[179],"demonstrate":[180],"efficiency":[182],"performance":[184],"PPV.":[186],"particular,":[188],"significantly":[190],"improves":[191],"throughput":[193],"goodput":[196],"verification,":[199],"achieves":[201],"around":[202],"2":[203],"times":[204,207],"3":[206],"improvement":[208],"compared":[209],"with":[210],"the-state-of-art":[211],"OPT":[212],"scheme,":[213],"respectively.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
