Network Forensic Attribution Article Swipe
R. C. Joshi
,
Emmanuel S. Pilli
·
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-1-4471-7299-4_7
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-1-4471-7299-4_7
Attribution is the process to investigate and attribute the attacks. In this chapter the attribution phase of network forensics is discussed. IP traceback mechanism is discussed with relevance to network forensics. Topics such as autonomous system-based traceback, router and interface marking, and network forensic traceback are discussed. In network forensic traceback technique relation between various traceback mechanisms is also discussed.
Related Topics
Concepts
Metadata
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-1-4471-7299-4_7
- OA Status
- hybrid
- Cited By
- 1
- References
- 45
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2558399685
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2558399685Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-1-4471-7299-4_7Digital Object Identifier
- Title
-
Network Forensic AttributionWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
R. C. Joshi, Emmanuel S. PilliList of authors in order
- Landing page
-
https://doi.org/10.1007/978-1-4471-7299-4_7Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/978-1-4471-7299-4_7Direct OA link when available
- Concepts
-
IP traceback, Network forensics, Attribution, Computer science, Relevance (law), Computer security, Denial-of-service attack, Digital forensics, Psychology, World Wide Web, The Internet, Law, Political science, Social psychologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2020: 1Per-year citation counts (last 5 years)
- References (count)
-
45Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2558399685 |
|---|---|
| doi | https://doi.org/10.1007/978-1-4471-7299-4_7 |
| ids.doi | https://doi.org/10.1007/978-1-4471-7299-4_7 |
| ids.mag | 2558399685 |
| ids.openalex | https://openalex.org/W2558399685 |
| fwci | 0.0 |
| type | book-chapter |
| title | Network Forensic Attribution |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 142 |
| biblio.first_page | 131 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998999834060669 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9998999834060669 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2776059407 |
| concepts[0].level | 4 |
| concepts[0].score | 0.6616921424865723 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q5973212 |
| concepts[0].display_name | IP traceback |
| concepts[1].id | https://openalex.org/C50747538 |
| concepts[1].level | 3 |
| concepts[1].score | 0.6329606175422668 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q7001032 |
| concepts[1].display_name | Network forensics |
| concepts[2].id | https://openalex.org/C143299363 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5873295068740845 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q900584 |
| concepts[2].display_name | Attribution |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.5087466835975647 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C158154518 |
| concepts[4].level | 2 |
| concepts[4].score | 0.45851871371269226 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q7310970 |
| concepts[4].display_name | Relevance (law) |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.45727044343948364 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C38822068 |
| concepts[6].level | 3 |
| concepts[6].score | 0.23715883493423462 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[6].display_name | Denial-of-service attack |
| concepts[7].id | https://openalex.org/C84418412 |
| concepts[7].level | 2 |
| concepts[7].score | 0.2266060709953308 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[7].display_name | Digital forensics |
| concepts[8].id | https://openalex.org/C15744967 |
| concepts[8].level | 0 |
| concepts[8].score | 0.12221372127532959 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[8].display_name | Psychology |
| concepts[9].id | https://openalex.org/C136764020 |
| concepts[9].level | 1 |
| concepts[9].score | 0.1206308901309967 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[9].display_name | World Wide Web |
| concepts[10].id | https://openalex.org/C110875604 |
| concepts[10].level | 2 |
| concepts[10].score | 0.11743080615997314 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[10].display_name | The Internet |
| concepts[11].id | https://openalex.org/C199539241 |
| concepts[11].level | 1 |
| concepts[11].score | 0.07674521207809448 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[11].display_name | Law |
| concepts[12].id | https://openalex.org/C17744445 |
| concepts[12].level | 0 |
| concepts[12].score | 0.05431064963340759 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[12].display_name | Political science |
| concepts[13].id | https://openalex.org/C77805123 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q161272 |
| concepts[13].display_name | Social psychology |
| keywords[0].id | https://openalex.org/keywords/ip-traceback |
| keywords[0].score | 0.6616921424865723 |
| keywords[0].display_name | IP traceback |
| keywords[1].id | https://openalex.org/keywords/network-forensics |
| keywords[1].score | 0.6329606175422668 |
| keywords[1].display_name | Network forensics |
| keywords[2].id | https://openalex.org/keywords/attribution |
| keywords[2].score | 0.5873295068740845 |
| keywords[2].display_name | Attribution |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.5087466835975647 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/relevance |
| keywords[4].score | 0.45851871371269226 |
| keywords[4].display_name | Relevance (law) |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.45727044343948364 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[6].score | 0.23715883493423462 |
| keywords[6].display_name | Denial-of-service attack |
| keywords[7].id | https://openalex.org/keywords/digital-forensics |
| keywords[7].score | 0.2266060709953308 |
| keywords[7].display_name | Digital forensics |
| keywords[8].id | https://openalex.org/keywords/psychology |
| keywords[8].score | 0.12221372127532959 |
| keywords[8].display_name | Psychology |
| keywords[9].id | https://openalex.org/keywords/world-wide-web |
| keywords[9].score | 0.1206308901309967 |
| keywords[9].display_name | World Wide Web |
| keywords[10].id | https://openalex.org/keywords/the-internet |
| keywords[10].score | 0.11743080615997314 |
| keywords[10].display_name | The Internet |
| keywords[11].id | https://openalex.org/keywords/law |
| keywords[11].score | 0.07674521207809448 |
| keywords[11].display_name | Law |
| keywords[12].id | https://openalex.org/keywords/political-science |
| keywords[12].score | 0.05431064963340759 |
| keywords[12].display_name | Political science |
| language | en |
| locations[0].id | doi:10.1007/978-1-4471-7299-4_7 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210175725 |
| locations[0].source.issn | 1617-7975, 2197-8433 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1617-7975 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computer communications and networks |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computer Communications and Networks |
| locations[0].landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_7 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101884639 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9612-2691 |
| authorships[0].author.display_name | R. C. Joshi |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[0].affiliations[0].raw_affiliation_string | Graphic Era University, Dehradun, Uttarakhand, India |
| authorships[0].institutions[0].id | https://openalex.org/I60054993 |
| authorships[0].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Graphic Era University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | R. C. Joshi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Graphic Era University, Dehradun, Uttarakhand, India |
| authorships[1].author.id | https://openalex.org/A5040360984 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6056-1147 |
| authorships[1].author.display_name | Emmanuel S. Pilli |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I83205935 |
| authorships[1].affiliations[0].raw_affiliation_string | Malaviya National Institute of Technology, Jaipur, Rajasthan, India |
| authorships[1].institutions[0].id | https://openalex.org/I83205935 |
| authorships[1].institutions[0].ror | https://ror.org/0077k1j32 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I83205935 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Malaviya National Institute of Technology Jaipur |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Emmanuel S. Pilli |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Malaviya National Institute of Technology, Jaipur, Rajasthan, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/978-1-4471-7299-4_7 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Network Forensic Attribution |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W1758531722, https://openalex.org/W2137245058, https://openalex.org/W2415732242, https://openalex.org/W2387543461, https://openalex.org/W2144471820, https://openalex.org/W4239706888, https://openalex.org/W2189229284, https://openalex.org/W2534766289, https://openalex.org/W2758074039, https://openalex.org/W2558399685 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2020 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-1-4471-7299-4_7 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210175725 |
| best_oa_location.source.issn | 1617-7975, 2197-8433 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1617-7975 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computer communications and networks |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computer Communications and Networks |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_7 |
| primary_location.id | doi:10.1007/978-1-4471-7299-4_7 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210175725 |
| primary_location.source.issn | 1617-7975, 2197-8433 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1617-7975 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computer communications and networks |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computer Communications and Networks |
| primary_location.landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_7 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W2171789423, https://openalex.org/W2041784634, https://openalex.org/W2165780801, https://openalex.org/W2156350103, https://openalex.org/W4236793779, https://openalex.org/W2154602876, https://openalex.org/W2060954861, https://openalex.org/W2170771030, https://openalex.org/W2001619556, https://openalex.org/W2083915432, https://openalex.org/W1959318606, https://openalex.org/W2144272949, https://openalex.org/W2168910675, https://openalex.org/W2153817899, https://openalex.org/W1660551007, https://openalex.org/W2163809997, https://openalex.org/W1977467230, https://openalex.org/W1482335581, https://openalex.org/W1997912148, https://openalex.org/W2097507242, https://openalex.org/W2120475852, https://openalex.org/W1940675549, https://openalex.org/W2123722532, https://openalex.org/W1971747875, https://openalex.org/W2023920268, https://openalex.org/W1987077602, https://openalex.org/W2018530135, https://openalex.org/W2162088056, https://openalex.org/W1594449936, https://openalex.org/W1511641794, https://openalex.org/W2534766289, https://openalex.org/W2083616151, https://openalex.org/W1984210439, https://openalex.org/W2073732532, https://openalex.org/W2066197655, https://openalex.org/W2080972121, https://openalex.org/W2119030343, https://openalex.org/W2117222554, https://openalex.org/W2170279776, https://openalex.org/W206164581, https://openalex.org/W2116923757, https://openalex.org/W2078434039, https://openalex.org/W1578138711, https://openalex.org/W2150228605, https://openalex.org/W207615063 |
| referenced_works_count | 45 |
| abstract_inverted_index.IP | 21 |
| abstract_inverted_index.In | 10, 47 |
| abstract_inverted_index.as | 33 |
| abstract_inverted_index.is | 1, 19, 24, 57 |
| abstract_inverted_index.of | 16 |
| abstract_inverted_index.to | 4, 28 |
| abstract_inverted_index.and | 6, 38, 41 |
| abstract_inverted_index.are | 45 |
| abstract_inverted_index.the | 2, 8, 13 |
| abstract_inverted_index.also | 58 |
| abstract_inverted_index.such | 32 |
| abstract_inverted_index.this | 11 |
| abstract_inverted_index.with | 26 |
| abstract_inverted_index.phase | 15 |
| abstract_inverted_index.Topics | 31 |
| abstract_inverted_index.router | 37 |
| abstract_inverted_index.between | 53 |
| abstract_inverted_index.chapter | 12 |
| abstract_inverted_index.network | 17, 29, 42, 48 |
| abstract_inverted_index.process | 3 |
| abstract_inverted_index.various | 54 |
| abstract_inverted_index.attacks. | 9 |
| abstract_inverted_index.forensic | 43, 49 |
| abstract_inverted_index.marking, | 40 |
| abstract_inverted_index.relation | 52 |
| abstract_inverted_index.attribute | 7 |
| abstract_inverted_index.discussed | 25 |
| abstract_inverted_index.forensics | 18 |
| abstract_inverted_index.interface | 39 |
| abstract_inverted_index.mechanism | 23 |
| abstract_inverted_index.relevance | 27 |
| abstract_inverted_index.technique | 51 |
| abstract_inverted_index.traceback | 22, 44, 50, 55 |
| abstract_inverted_index.autonomous | 34 |
| abstract_inverted_index.discussed. | 20, 46, 59 |
| abstract_inverted_index.forensics. | 30 |
| abstract_inverted_index.mechanisms | 56 |
| abstract_inverted_index.traceback, | 36 |
| abstract_inverted_index.Attribution | 0 |
| abstract_inverted_index.attribution | 14 |
| abstract_inverted_index.investigate | 5 |
| abstract_inverted_index.system-based | 35 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6000000238418579 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.23910615 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |