{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T06:54:16Z","timestamp":1768028056955,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540317784","type":"print"},{"value":"9783540317791","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11663812_13","type":"book-chapter","created":{"date-parts":[[2006,1,20]],"date-time":"2006-01-20T12:57:08Z","timestamp":1137761828000},"page":"247-264","source":"Crossref","is-referenced-by-count":18,"title":["On Interactive Internet Traffic Replay"],"prefix":"10.1007","author":[{"given":"Seung-Sun","family":"Hong","sequence":"first","affiliation":[]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"The InterOperability Laboratory (IOL) homepage, http:\/\/www.iol.unh.edu (accessed March 12, 2005)"},{"key":"13_CR2","unstructured":"The Wisconsin Advanced Internet Laboratory (WAIL) homepage, http:\/\/wail.cs.wisc.edu (accessed March 12, 2005)"},{"key":"13_CR3","unstructured":"The Network Simulator (NS-2) homepage, http:\/\/www.isi.edu\/nsnam\/ns (accessed March 12, 2005)"},{"key":"13_CR4","unstructured":"Scalable Simulation Framework Research Network (SSFNET) homepage, http:\/\/www.ssfnet.org (accessed March 12, 2005)"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/844128.844154","volume":"36","author":"A. Vahdat","year":"2002","unstructured":"Vahdat, A., Yocum, K., Walsh, K., Mahadevan, P., Kosti, D., Chase, J., Becker, D.: Scalability and accuracy in a large-scale network emulator. SIGOPS Oper. Syst. Rev.\u00a036, 271\u2013284 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An Integrated Experimental Environment for Distributed Systems and Networks. In: OSDIO2, Boston, MA, pp. 255\u2013270 (2002)","DOI":"10.1145\/844128.844152"},{"issue":"1","key":"13_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/774763.774772","volume":"33","author":"L. Peterson","year":"2003","unstructured":"Peterson, L., Anderson, T., Culler, A., Roscoe, T.: A blueprint for introducing disruptive technology into the Internet. SIGCOMM Comput. Commun. Rev.\u00a033(1), 59\u201364 (2003)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Touch, J.: Dynamic Internet overlay deployment and management using the X-Bone. In: ICNP 2000: Proceedings of the 2000 International Conference on Network Protocols, pp. 59\u201367 (2000)","DOI":"10.1109\/ICNP.2000.896292"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/971617.971646","volume":"47","author":"R. Bajcsy","year":"2004","unstructured":"Bajcsy, R., Benzel, T., Bishop, M., Braden, B., Brodley, C., Fahmy, S., Floyd, S., Hardaker, W., Joseph, A., Kesidis, G., Levitt, K., Lindell, B., Liu, P., Miller, D., Mundy, R., Neuman, C., Ostrenga, R., Paxson, V., Porras, P., Rosenberg, C., Tygar, J.D., Sastry, S., Sterne, D., Wu, S.F.: Cyber defense technology networking and evaluation. Commun. ACM\u00a047(3), 58\u201361 (2004)","journal-title":"Commun. ACM"},{"key":"13_CR10","unstructured":"POSIX Thread tutorial page: http:\/\/www.llnl.gov\/computing\/tutorials\/workshops\/workshop\/pthreads\/MAIN.html (accessed March 13, 2005)"},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/251007.251012","volume":"27","author":"L. Rizzo","year":"1997","unstructured":"Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM Computer Communication Review\u00a027(1), 31\u201341 (1997)","journal-title":"ACM Computer Communication Review"},{"key":"13_CR12","unstructured":"MIT Lincoln Labs. DARPA Intrusion Detection Evaluation, http:\/\/www.ll.mit.edu\/IST\/ideval\/ (accessed March 13, 2005)"},{"key":"13_CR13","unstructured":"The Snort homepage, http:\/\/www.snort.org\/ (accessed March 13, 2005)"},{"key":"13_CR14","unstructured":"The TCPREPLAY & FLOWRELAY homepage, http:\/\/tcpreplay.sourceforge.net\/ (accessed March 14, 2005)"},{"key":"13_CR15","unstructured":"The TCPDUMP homepage, http:\/\/www.tcpdump.org\/ (accessed March 14, 2005)"},{"key":"13_CR16","unstructured":"The libpcap project homepage, http:\/\/sourceforge.net\/projects\/libpcap\/ (accessed March 14, 2005)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Feng, W.-c., Goel, A., Bezzaz, A., Feng, W.-c., Walpole, J.: TCPivo: a high-performance packet replay engine. In: MoMeTools 2003: Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research, pp. 57\u201364 (2003)","DOI":"10.1145\/944773.944783"},{"key":"13_CR18","unstructured":"Cheng, Y., H\u00f6lzle, U., Cardwell, N., Savage, S., Voelker, C.M.: Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. In: USENIX Annual Technical Conference, General Track, pp. 87\u201398 (2004)"},{"key":"13_CR19","unstructured":"The Tomahawk Test Tool homepage, http:\/\/tomahawk.sourceforge.net\/ (accessed March 14, 2005)"},{"key":"13_CR20","unstructured":"The LIBNET project homepage, http:\/\/www.packetfactory.net\/libnet\/ (accessed March 16, 2005)"},{"key":"13_CR21","unstructured":"The libpcap project homepage, http:\/\/sourceforge.net\/projects\/libpcap\/ (accessed March 14, 2005)"},{"key":"13_CR22","volume-title":"TCP\/IP illustrated: the implementation","author":"W.R. Stevens","year":"1995","unstructured":"Stevens, W.R., Write, G.R.: TCP\/IP illustrated: the implementation, vol.\u00a02. Addison-Wesley Longman Publishing Co., Inc., Amsterdam (1995)"},{"issue":"4","key":"13_CR23","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1145\/52325.52356","volume":"18","author":"V. Jacobson","year":"1988","unstructured":"Jacobson, V.: Congestion avoidance and control. SIGCOMM Comput. Commun. Rev.\u00a018(4), 314\u2013329 (1988)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"13_CR24","volume-title":"Proceedings of the Eighteenth Internet Engineering Task Force","author":"V. Jacobson","year":"1990","unstructured":"Jacobson, V.: Berleley TCP Evolution from 4.3-Tahoe to 4.3-Reno. In: Proceedings of the Eighteenth Internet Engineering Task Force. University of British Columbia, Vancouver (1990)"},{"key":"13_CR25","unstructured":"Jacobson, V.: Modified TCP Congestion Avoidance Algorithm. end2end-interest mailing list (1990)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11663812_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T08:24:50Z","timestamp":1736238290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11663812_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540317784","9783540317791"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11663812_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}