{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:58:21Z","timestamp":1774022301283,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030004330","type":"print"},{"value":"9783030004347","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00434-7_4","type":"book-chapter","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T17:35:51Z","timestamp":1535736951000},"page":"69-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["DNS-DNS: DNS-Based De-NAT Scheme"],"prefix":"10.1007","author":[{"given":"Liran","family":"Orevi","sequence":"first","affiliation":[]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[]},{"given":"Haim","family":"Zlatokrilov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,1]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M.: A technique for counting NATted hosts. In: Internet Measurement Workshop, pp. 267\u2013272. ACM (2002)","DOI":"10.1145\/637201.637243"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-24668-8_16","volume-title":"Passive and Active Network Measurement","author":"R Beverly","year":"2004","unstructured":"Beverly, R.: A robust classifier for passive TCP\/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158\u2013167. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24668-8_16"},{"key":"4_CR3","unstructured":"Bursztein, E.: Time has something to tell us about network address translation. In: Erlingsson,\u00da., Sabelfeld, A. (eds.) Proceedings of the 12th Nordic Workshop on Secure IT Systems (NordSec 2007), Reykjavik, Iceland, October 2007"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-22137-8_27","volume-title":"Security Protocols XVI","author":"G Danezis","year":"2011","unstructured":"Danezis, G.: Covert communications despite traffic data retention. In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds.) Security Protocols 2008. LNCS, vol. 6615, pp. 198\u2013214. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22137-8_27"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Gokcen, Y., Foroushani, V.A., Zincir-Heywood, A.N.: Can we identify NAT behavior by analyzing traffic flows? In: 35th IEEE Security and Privacy Workshops, SPW 2014, San Jose, CA, USA, 17\u201318 May 2014, pp. 132\u2013139 (2014)","DOI":"10.1109\/SPW.2014.28"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-31680-7_6","volume-title":"Privacy Enhancing Technologies","author":"Y Gilad","year":"2012","unstructured":"Gilad, Y., Herzberg, A.: Spying in the dark: TCP and tor traffic analysis. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 100\u2013119. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_6"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2013.130","volume":"12","author":"Y Gilad","year":"2014","unstructured":"Gilad, Y., Herzberg, A., Shulman, H.: Off-path hacking: the illusion of challenge-response authentication. IEEE Secur. Priv. 12(5), 68\u201377 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.cose.2013.03.012","volume":"39","author":"D Herrmann","year":"2013","unstructured":"Herrmann, D., Banse, C., Federrath, H.: Behavior-based tracking: exploiting characteristic patterns in DNS traffic. Comput. Secur. 39, 17\u201333 (2013)","journal-title":"Comput. Secur."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Kirchler, M., Herrmann, D., Lindemann, J., Kloft, M.: Tracked without a trace: linking sessions of users by unsupervised learning of patterns in their DNS traffic. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, 28 October 2016, pp. 23\u201334 (2016)","DOI":"10.1145\/2996758.2996770"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names - concepts and facilities, RFC 1034, November 1987","DOI":"10.17487\/rfc1034"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Postel, J.: Internet datagram protocol RFC791. USC\/Information Sciences Institute, RFC 791, September 1981","DOI":"10.17487\/rfc0768"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Srisuresh, P., Egevang, K.: Traditional IP network address translator (traditional NAT), RFC 3022, January 2001","DOI":"10.17487\/rfc3022"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Shulman, H.: Pretty bad privacy: pitfalls of DNS encryption. In: Ahn, G.-J., Datta, A. (eds.) WPES, pp. 191\u2013200. ACM (2014)","DOI":"10.1145\/2665943.2665959"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Wicherski, G., Weingarten, F., Meyer, U.: IP agnostic real-time traffic filtering and host identification using TCP timestamps. In: LCN, pp. 647\u2013654. IEEE Computer Society (2013)","DOI":"10.1109\/LCN.2013.6761302"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00434-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T06:01:17Z","timestamp":1571810477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00434-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004330","9783030004347"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00434-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"1 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cans2018.na.icar.cnr.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}