{"id":"https://openalex.org/W1976881801","doi":"https://doi.org/10.1145/1143549.1143620","title":"Tracers placement for IP traceback against DDoS attacks","display_name":"Tracers placement for IP traceback against DDoS attacks","publication_year":2006,"publication_date":"2006-07-03","ids":{"openalex":"https://openalex.org/W1976881801","doi":"https://doi.org/10.1145/1143549.1143620","mag":"1976881801"},"language":"en","primary_location":{"id":"doi:10.1145/1143549.1143620","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033895411","display_name":"Chun-Hsin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chun-Hsin Wang","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063435084","display_name":"Chang Wu Yu","orcid":"https://orcid.org/0000-0001-7783-1513"},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chang-Wu Yu","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003331293","display_name":"Chiu-Kuo Liang","orcid":"https://orcid.org/0000-0003-4693-2420"},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chiu-Kuo Liang","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029439105","display_name":"Kun-Min Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kun-Min Yu","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101688979","display_name":"Wen Ouyang","orcid":"https://orcid.org/0000-0001-5558-7804"},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wen Ouyang","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035377793","display_name":"Ching\u2010Hsien Hsu","orcid":"https://orcid.org/0000-0002-2440-2771"},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Hsien Hsu","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034525059","display_name":"Yu-Guang Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I59460038","display_name":"Chung Hua University","ror":"https://ror.org/01yzz0f51","country_code":"TW","type":"education","lineage":["https://openalex.org/I59460038"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Guang Chen","raw_affiliation_strings":["Chung Hua University, Hsin Chu, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Chung Hua University, Hsin Chu, Taiwan, R.O.C","institution_ids":["https://openalex.org/I59460038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5033895411"],"corresponding_institution_ids":["https://openalex.org/I59460038"],"apc_list":null,"apc_paid":null,"fwci":0.9053,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76380803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"355","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.9203066825866699},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8361879587173462},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8129749298095703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7261744141578674},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.640230655670166},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5770068764686584},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.530322253704071},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5185930728912354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4512282609939575},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3294254541397095},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16999980807304382},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11084556579589844},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07721832394599915},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06049409508705139}],"concepts":[{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.9203066825866699},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8361879587173462},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8129749298095703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7261744141578674},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.640230655670166},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5770068764686584},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.530322253704071},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5185930728912354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4512282609939575},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3294254541397095},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16999980807304382},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11084556579589844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07721832394599915},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06049409508705139},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1143549.1143620","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W206164581","https://openalex.org/W1484040084","https://openalex.org/W1578138711","https://openalex.org/W1657108660","https://openalex.org/W1948092788","https://openalex.org/W1959318606","https://openalex.org/W2041784634","https://openalex.org/W2084896955","https://openalex.org/W2104692292","https://openalex.org/W2105808107","https://openalex.org/W2129103988","https://openalex.org/W2135708813","https://openalex.org/W2140471436","https://openalex.org/W2145524458","https://openalex.org/W2150228605","https://openalex.org/W2170771030","https://openalex.org/W6814336774"],"related_works":["https://openalex.org/W1493760256","https://openalex.org/W2199179552","https://openalex.org/W2184397768","https://openalex.org/W2353701916","https://openalex.org/W2072426395","https://openalex.org/W2353807305","https://openalex.org/W1968168724","https://openalex.org/W2151002785","https://openalex.org/W2097740006","https://openalex.org/W2359323920"],"abstract_inverted_index":{"This":[0],"paper":[1],"explores":[2],"the":[3,15,21,28,33,42,61,83,99,105,115,118],"tracers":[4,16,36,102,119],"deployment":[5,37],"problem":[6,48],"for":[7,26,82,104],"IP":[8],"traceback":[9],"methods":[10],"how":[11],"many":[12],"and":[13,67,95],"where":[14],"should":[17],"be":[18,24,52,72,91],"deployed":[19],"in":[20,93],"network":[22],"to":[23,51,97,113],"effective":[25],"locating":[27,41],"attack":[29,43,65,88],"origins.":[30],"The":[31,47,79],"minimizing":[32],"number":[34,100],"of":[35,85,101,117],"problems":[38],"depended":[39],"on":[40],"origins":[44],"are":[45,111],"defined.":[46],"is":[49,77],"proved":[50],"NP-complete.":[53],"A":[54],"heuristic":[55,107],"method":[56],"which":[57],"can":[58,90],"guarantee":[59],"that":[60],"distance":[62,76],"between":[63],"any":[64],"origin":[66],"its":[68],"first":[69],"met":[70],"tracer":[71],"within":[73],"an":[74,86],"assigned":[75],"proposed.":[78],"upper":[80],"bound":[81],"probability":[84],"undetected":[87],"node":[89],"calculated":[92],"advance":[94],"used":[96],"evaluate":[98],"needed":[103],"proposed":[106],"method.":[108],"Extended":[109],"simulations":[110],"performed":[112],"study":[114],"performance":[116],"deployment.":[120]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
