{"id":"https://openalex.org/W1868909187","doi":"https://doi.org/10.1109/discex.2003.1194937","title":"SPIE demonstration: single packet traceback","display_name":"SPIE demonstration: single packet traceback","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W1868909187","doi":"https://doi.org/10.1109/discex.2003.1194937","mag":"1868909187"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053504300","display_name":"W. Timothy Strayer","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"W.T. Strayer","raw_affiliation_strings":["BBN Technol., Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"BBN Technol., Cambridge, MA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066158785","display_name":"Christine E. Jones","orcid":"https://orcid.org/0000-0003-1523-2368"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"C.E. Jones","raw_affiliation_strings":["BBN Technol., Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"BBN Technol., Cambridge, MA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022627822","display_name":"Fabrice Tchakountio","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"F. Tchakountio","raw_affiliation_strings":["BBN Technol., Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"BBN Technol., Cambridge, MA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029890607","display_name":"Alex C. Snoeren","orcid":"https://orcid.org/0000-0001-5679-3888"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"A.C. Snoeren","raw_affiliation_strings":["BBN Technol., Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"BBN Technol., Cambridge, MA, USA","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":61},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/packet-generator","display_name":"Packet generator","score":0.6974932},{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.6445896},{"id":"https://openalex.org/keywords/packet-analyzer","display_name":"Packet analyzer","score":0.60199374},{"id":"https://openalex.org/keywords/link-state-packet","display_name":"Link state packet","score":0.5950043},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.43334416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485662},{"id":"https://openalex.org/C158381197","wikidata":"https://www.wikidata.org/wiki/Q606516","display_name":"Packet generator","level":5,"score":0.6974932},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6970588},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.67786044},{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.6445896},{"id":"https://openalex.org/C95362637","wikidata":"https://www.wikidata.org/wiki/Q54366","display_name":"Packet analyzer","level":3,"score":0.60199374},{"id":"https://openalex.org/C141947644","wikidata":"https://www.wikidata.org/wiki/Q3888408","display_name":"Link state packet","level":5,"score":0.5950043},{"id":"https://openalex.org/C21434264","wikidata":"https://www.wikidata.org/wiki/Q7247320","display_name":"Processing delay","level":4,"score":0.5183264},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.5169127},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.477439},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.43334416},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41338927},{"id":"https://openalex.org/C108921912","wikidata":"https://www.wikidata.org/wiki/Q7834639","display_name":"Transmission delay","level":3,"score":0.2820245},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.18041089},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1761044},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16926903},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.13978744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.115291834},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4384432930","https://openalex.org/W3011083237","https://openalex.org/W2560551940","https://openalex.org/W2539355661","https://openalex.org/W2475759309","https://openalex.org/W2372231800","https://openalex.org/W2183699885","https://openalex.org/W1996538372","https://openalex.org/W1868909187","https://openalex.org/W1533338668"],"abstract_inverted_index":{"SPIE,":[0],"the":[1,29,56,74,78,118,130,158],"Source":[2],"Path":[3],"Isolation":[4],"Engine,":[5],"is":[6,53,96,115],"a":[7,17,84,94,113,142,149],"DARPA-funded":[8],"system":[9,105,120],"for":[10,89,126],"tracing":[11,32],"single":[12],"IP":[13],"packets":[14,34,75],"back":[15],"through":[16],"network":[18],"of":[19,46,49,62,73,86,129,136],"instrumented":[20],"routers":[21,82,125],"or":[22,161],"tap":[23],"boxes":[24],"that":[25,70,156],"are":[26,139],"associated":[27],"with":[28],"routers.":[30],"Historically,":[31],"individual":[33],"by":[35,65,101,109],"keeping":[36],"packet":[37,68,79,87,95,127],"logs":[38],"at":[39],"each":[40],"router":[41],"has":[42],"required":[43],"prohibitive":[44],"amounts":[45],"memory;":[47],"one":[48],"SPIE's":[50],"key":[51],"innovations":[52],"to":[54,60,98,117,147],"reduce":[55],"memory":[57],"requirement":[58],"(down":[59],"0.5%":[61],"link":[63],"capacity)":[64],"storing":[66],"only":[67],"digests,":[69],"is,":[71],"hashes":[72],"rather":[76],"than":[77],"itself.":[80],"SPIE-enhanced":[81],"maintain":[83],"cache":[85],"digests":[88,128],"recently":[90],"forwarded":[91],"traffic.":[92],"If":[93],"determined":[97],"be":[99],"offensive":[100],"an":[102],"intrusion":[103],"detection":[104],"(or":[106],"judged":[107],"interesting":[108],"some":[110],"other":[111],"metric),":[112],"query":[114,138],"dispatched":[116],"SPIE":[119],"that,":[121],"in":[122,141],"turn,":[123],"queries":[124],"relevant":[131],"time":[132],"periods.":[133],"ne":[134],"results":[135],"this":[137],"used":[140],"simulated":[143],"reverse-path":[144],"flooding":[145],"algorithm":[146],"build":[148],"highly":[150],"reliable":[151],"and":[152],"accurate":[153],"attack":[154],"graph":[155],"identifies":[157],"packet's":[159],"source":[160],"sources.":[162]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1868909187","counts_by_year":[],"updated_date":"2024-12-15T15:27:49.025669","created_date":"2016-06-24"}