{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T04:55:35Z","timestamp":1748321735506,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031575365"},{"type":"electronic","value":"9783031575372"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57537-2_19","type":"book-chapter","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T19:02:38Z","timestamp":1713985358000},"page":"302-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["UDP State Manipulation: Description of\u00a0a\u00a0Packet Filtering Vulnerability in\u00a0Stateful Firewalls"],"prefix":"10.1007","author":[{"given":"Wassim","family":"Koribeche","sequence":"first","affiliation":[]},{"given":"David","family":"Espes","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Morin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Gregg, M. (ed.): Hack the Stack, pp. 151\u2013203. Syngress. https:\/\/doi.org\/10.1016\/B978-159749109-9\/50009-5, https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9781597491099500095","DOI":"10.1016\/B978-159749109-9\/50009-5"},{"key":"19_CR2","doi-asserted-by":"publisher","unstructured":"Garcia, N.M., Gil, F., Matos, B., Yahaya, C., Pombo, N., Goleva, R.I.: Keyed user datagram protocol: concepts and operation of an almost reliable connectionless transport protocol. IEEE Access 7, 18951\u201318963 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2886707","DOI":"10.1109\/ACCESS.2018.2886707"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Gouda, M.G., Liu, A.X.: A model of stateful firewalls and its properties. In: 2005 International Conference on Dependable Systems and Networks (DSN\u201905), pp. 128\u2013137. IEEE (2005)","DOI":"10.1109\/DSN.2005.9"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Huang, H., Hu, L., Chu, J., Cheng, X.: An authentication scheme to defend against UDP DrDoS attacks in 5g networks. IEEE Access 7, 175970\u2013175979 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2957565","DOI":"10.1109\/ACCESS.2019.2957565"},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Hussain, M.A., Jin, H., Hussien, Z.A., Abduljabbar, Z.A., Abbdal, S.H., Ibrahim, A.: DNS protection against spoofing and poisoning attacks. In: 2016 3rd International Conference on Information Science and Control Engineering (ICISCE), pp. 1308\u20131312 (2016). https:\/\/doi.org\/10.1109\/ICISCE.2016.279","DOI":"10.1109\/ICISCE.2016.279"},{"key":"19_CR6","unstructured":"IBM whitepaper: An architectural blueprint for autonomic computing"},{"key":"19_CR7","unstructured":"Kim, H., Pak, W., Ju, H.: Correlation analysis between inference accuracy and inference parameters for stateless firewall policy. In: 2013 15th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.\u00a01\u20136 (2013)"},{"key":"19_CR8","doi-asserted-by":"publisher","unstructured":"Klein, A.: Subverting stateful firewalls with protocol states. In: Proceedings 2022 Network and Distributed System Security Symposium. Internet Society. https:\/\/doi.org\/10.14722\/ndss.2022.23037, https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2022-37-paper.pdf","DOI":"10.14722\/ndss.2022.23037"},{"key":"19_CR9","unstructured":"McCanne, S., Jacobson, V.: The BSD packet filter: a new architecture for user-level packet capture. In: USENIX Winter, vol. 46 (1993)"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Sassani, B.A., Abarro, C., Pitton, I., Young, C., Mehdipour, F.: Analysis of NTP DRDoS attacks\u2019 performance effects and mitigation techniques. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 421\u2013427 (2016). https:\/\/doi.org\/10.1109\/PST.2016.7906966","DOI":"10.1109\/PST.2016.7906966"},{"key":"19_CR11","doi-asserted-by":"publisher","unstructured":"Trabelsi, Z., Zeidan, S.: Resilence of network stateful firewalls against emerging dos attacks: a case study of the blacknurse attack. In: 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA), pp.\u00a01\u20138 (2019). https:\/\/doi.org\/10.1109\/AICCSA47632.2019.9035323","DOI":"10.1109\/AICCSA47632.2019.9035323"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57537-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T23:46:40Z","timestamp":1731800800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57537-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031575365","9783031575372"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bordeaux","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}