{"id":"https://openalex.org/W2026787659","doi":"https://doi.org/10.1109/lcn.2013.6761258","title":"UAS: Universal anti-spoofing by incorporating existing mechanisms","display_name":"UAS: Universal anti-spoofing by incorporating existing mechanisms","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2026787659","doi":"https://doi.org/10.1109/lcn.2013.6761258","mag":"2026787659"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2013.6761258","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcn.2013.6761258","pdf_url":"https://ieeexplore.ieee.org/ielx7/6745315/6761208/06761258.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"38th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6745315/6761208/06761258.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016917496","display_name":"Hyok An","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyok An","raw_affiliation_strings":["Div. of Computer and Communication Engineering, Korea University, Seoul, Korea","Div. of Comput. & Commun. Eng., Korea Univ., Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Div. of Computer and Communication Engineering, Korea University, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Div. of Comput. & Commun. Eng., Korea Univ., Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101630726","display_name":"Heejo Lee","orcid":"https://orcid.org/0000-0002-5831-0787"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heejo Lee","raw_affiliation_strings":["Div. of Computer and Communication Engineering, Korea University, Seoul, Korea","Div. of Comput. & Commun. Eng., Korea Univ., Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Div. of Computer and Communication Engineering, Korea University, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Div. of Comput. & Commun. Eng., Korea Univ., Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056518136","display_name":"Adrian Perrig","orcid":"https://orcid.org/0000-0002-5280-5412"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Adrian Perrig","raw_affiliation_strings":["ETH, Institute of Information Security, Zurich, Switzerland","Institute of Information Security, ETH-Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH, Institute of Information Security, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"Institute of Information Security, ETH-Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016917496"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1252515,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":null,"first_page":"316","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8885592222213745},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.7927259206771851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7658282518386841},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7452223896980286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5708736777305603},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5442661046981812},{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.5074836611747742},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5035175681114197},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.43800896406173706},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.4350410997867584},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4311736524105072},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.34081828594207764},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.25332021713256836},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.09363225102424622}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8885592222213745},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.7927259206771851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7658282518386841},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7452223896980286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5708736777305603},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5442661046981812},{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.5074836611747742},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5035175681114197},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.43800896406173706},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.4350410997867584},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4311736524105072},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34081828594207764},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.25332021713256836},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.09363225102424622},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2013.6761258","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcn.2013.6761258","pdf_url":"https://ieeexplore.ieee.org/ielx7/6745315/6761208/06761258.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"38th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/lcn.2013.6761258","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcn.2013.6761258","pdf_url":"https://ieeexplore.ieee.org/ielx7/6745315/6761208/06761258.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"38th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2986127893","display_name":null,"funder_award_id":"2012M3A2A1051118","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G3494007552","display_name":null,"funder_award_id":"NRF-2012","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G3673306713","display_name":null,"funder_award_id":"2012M3A2A1051118","funder_id":"https://openalex.org/F4320322030","funder_display_name":"Ministry of Science, ICT and Future Planning"},{"id":"https://openalex.org/G982292920","display_name":null,"funder_award_id":"NRF-20","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320322030","display_name":"Ministry of Science, ICT and Future Planning","ror":"https://ror.org/032e49973"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2026787659.pdf","grobid_xml":"https://content.openalex.org/works/W2026787659.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1867219652","https://openalex.org/W1967949770","https://openalex.org/W2084830206","https://openalex.org/W2117175761","https://openalex.org/W2119101903","https://openalex.org/W2136262545","https://openalex.org/W2145327498","https://openalex.org/W2157035599","https://openalex.org/W2162133150","https://openalex.org/W2170771030","https://openalex.org/W4244097969","https://openalex.org/W4250493029","https://openalex.org/W6639156192","https://openalex.org/W6671431989","https://openalex.org/W6677491957"],"related_works":["https://openalex.org/W2170470865","https://openalex.org/W2167302331","https://openalex.org/W2359167911","https://openalex.org/W1493760256","https://openalex.org/W2342208107","https://openalex.org/W2151002785","https://openalex.org/W2791075267","https://openalex.org/W2290771989","https://openalex.org/W1969940477","https://openalex.org/W2127772962"],"abstract_inverted_index":{"IP":[0,17,50,66],"spoofing":[1,18,51,67],"is":[2,85],"attractive":[3],"to":[4,9,15,64,135,138],"amplify":[5],"network":[6,103],"attacks":[7],"and":[8,46,89],"provide":[10],"anonymity.":[11],"Many":[12],"approaches":[13],"have":[14],"prevent":[16],"attacks;":[19],"however,":[20],"they":[21],"do":[22],"not":[23],"address":[24],"a":[25,55,83,101,109],"significant":[26],"deployment":[27],"issue:":[28],"filtering":[29],"inefficiency":[30],"caused":[31],"by":[32,116],"lack":[33],"of":[34,108,122],"incentives":[35],"for":[36],"early":[37],"adopters.":[38],"Practically,":[39],"no":[40],"mechanism":[41,59,79,142],"has":[42],"been":[43],"widely":[44],"deployed":[45],"none":[47],"successfully":[48],"blocks":[49],"attacks.":[52,68],"We":[53],"propose":[54],"universal":[56],"anti-spoofing":[57,78,151],"(UAS)":[58],"that":[60,80,129,148],"incorporates":[61],"existing":[62,77],"mechanisms":[63,152],"thwart":[65],"In":[69],"the":[70,94,106,113,117],"proposed":[71],"mechanism,":[72],"intermediate":[73],"routers":[74,99],"utilize":[75],"any":[76],"ascertains":[81],"whether":[82],"packet":[84,95,110],"spoofed":[86],"or":[87],"not,":[88],"inscribes":[90],"this":[91],"information":[92,114],"in":[93],"header.":[96],"The":[97,120],"edge":[98],"at":[100],"victim":[102],"can":[104],"estimate":[105],"forgery":[107],"based":[111],"on":[112],"sent":[115],"upstream":[118],"routers.":[119],"results":[121],"experiments":[123],"conducted":[124],"with":[125],"Internet":[126],"topologies":[127],"indicate":[128],"UAS":[130],"reduces":[131,153],"false":[132,154],"alarms":[133,155],"up":[134],"84.5%":[136],"compared":[137],"cases":[139],"where":[140],"each":[141],"operates":[143],"separately.":[144],"Our":[145],"evaluation":[146],"shows":[147],"incorporating":[149],"multiple":[150],"significantly.":[156]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
