{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:49:51Z","timestamp":1730314191088,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229293","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"20-31","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["BASE"],"prefix":"10.1145","author":[{"given":"Heejo","family":"Lee","sequence":"first","affiliation":[{"name":"Korea University, Seoul, South KOREA"}]},{"given":"Minjin","family":"Kwon","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, South KOREA"}]},{"given":"Geoffrey","family":"Hasker","sequence":"additional","affiliation":[{"name":"CyLab \/ CMU, Pittsburgh"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"CyLab \/ CMU, Pittsburgh"}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"H. Aljifri M. Smets and A. P. Pons. IP traceback using header compression. Computers & Security Feb. 2003. H. Aljifri M. Smets and A. P. Pons. IP traceback using header compression. Computers & Security Feb. 2003.","DOI":"10.1016\/S0167-4048(03)00212-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"F. Baker and P. Savola. Ingress filtering for multihomed networks. RFC 3704 Mar. 2004. F. Baker and P. Savola. Ingress filtering for multihomed networks. RFC 3704 Mar. 2004.","DOI":"10.17487\/rfc3704"},{"key":"e_1_3_2_1_3_1","unstructured":"S. Bellovin M. Leech and T. Taylor. The ICMP traceback message. Internet-Draft draft-ietf-itrace-01.txt Oct. 2001. Work in progress available at ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-ietf-itrace-01.txt. S. Bellovin M. Leech and T. Taylor. The ICMP traceback message. Internet-Draft draft-ietf-itrace-01.txt Oct. 2001. Work in progress available at ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-ietf-itrace-01.txt."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784765"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"CERT. TCP SYN flooding and IP spoofing attacks. Advisory CA-96.21 September 1996. CERT. TCP SYN flooding and IP spoofing attacks. Advisory CA-96.21 September 1996.","DOI":"10.1016\/S1353-4858(96)90059-8"},{"volume-title":"Updated News Flash","year":"2003","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301318"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827 May 2000. P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827 May 2000.","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_1_9_1","unstructured":"D. Fisher. Internet survives massive ddos attack. http:\/\/www.eweek.com\/article2\/0 1759 1498701 00.asp Oct. 2002. D. Fisher. Internet survives massive ddos attack. http:\/\/www.eweek.com\/article2\/0 1759 1498701 00.asp Oct. 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"volume-title":"Proceedings of IEEE Globecom","year":"2005","author":"He Y.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"T. Krovetz. Umac: Message Authentication Code using Universal Hashing. RFC 4418 Mar. 2006. T. Krovetz. Umac: Message Authentication Code using Universal Hashing. RFC 4418 Mar. 2006.","DOI":"10.17487\/rfc4418"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"volume-title":"Proceedings of IEEE Infocomm","year":"2001","author":"Lee H.","key":"e_1_3_2_1_15_1"},{"volume-title":"Proceedings of IEEE INFOCOM","year":"2002","author":"Li J.","key":"e_1_3_2_1_16_1"},{"volume-title":"Registering New BGP Attribute Types. RFC 2042","year":"1997","author":"Manning B.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"D. Meyer. University of Oregon Route Views archive project. http:\/\/archive.routeviews.org 2005. D. Meyer. University of Oregon Route Views archive project. http:\/\/archive.routeviews.org 2005."},{"volume-title":"HarperCollins Publishers","year":"1995","author":"Moore G. A.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383061"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248160"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"J. Postel. Internet protocol. RFC 791 Sept. 1981. J. Postel. Internet protocol. RFC 791 Sept. 1981.","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_1_23_1","first-page":"4271","volume":"4","author":"Rekhter Y.","year":"2006","journal-title":"A Border Gateway Protocol"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"volume-title":"Proceedings of IEEE Infocomm","year":"2001","author":"Song D.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863970"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781069"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.1998.662048"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830562"}],"event":{"name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore","acronym":"Asia CCS07"},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T14:35:40Z","timestamp":1673015740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229293"}},"subtitle":["an incrementally deployable mechanism for viable IP spoofing prevention"],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":29,"alternative-id":["10.1145\/1229285.1229293","10.1145\/1229285"],"URL":"http:\/\/dx.doi.org\/10.1145\/1229285.1229293","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}