{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:18:24Z","timestamp":1770221904298,"version":"3.49.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319155081","type":"print"},{"value":"9783319155098","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_1","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["$$\\sim $$Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers"],"prefix":"10.1007","author":[{"given":"Andrew J.","family":"Kaizer","sequence":"first","affiliation":[]},{"given":"Minaxi","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"1_CR1","unstructured":"Anatomy of wordpress XML-RPC pingback attacks. https:\/\/blogs.akamai.com\/2014\/03\/anatomy-of-wordpress-xml-rpc-pingback-attacks.html"},{"key":"1_CR2","unstructured":"Communications security, reliability and interoperability council III \u2014 FCC.gov. http:\/\/www.fcc.gov\/encyclopedia\/communications-security-reliability-and-interoperability-council-iii"},{"key":"1_CR3","unstructured":"FTP protocol client. https:\/\/docs.python.org\/2\/library\/ftplib.html"},{"key":"1_CR4","unstructured":"IP to ASN mapping - Team Cymru. https:\/\/www.team-cymru.org\/Services\/ip-to-asn.html"},{"key":"1_CR5","unstructured":"Million plus resolver challenge - Team Cymru. https:\/\/www.team-cymru.org\/Services\/Resolvers\/instructions.html"},{"key":"1_CR6","unstructured":"nmap - Network mapper. http:\/\/nmap.org\/"},{"key":"1_CR7","unstructured":"Open resolver project. http:\/\/openresolverproject.org\/"},{"key":"1_CR8","unstructured":"Scapy - Packet manipulation and construction program. http:\/\/www.secdev.org\/projects\/scapy\/"},{"key":"1_CR9","unstructured":"Technical details behind a 400\u00a0Gbps NTP amplification DDoS attack \u2014 CloudFlare blog. http:\/\/blog.cloudflare.com\/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack"},{"key":"1_CR10","unstructured":"urllib2 - Extensible library for opening urls. https:\/\/docs.python.org\/2\/library\/urllib2.html"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Audet, F., Jennings, C.: Ietf RFC 4787 \u2014 network address translation (NAT) behavioral requirements for unicast UDP, Jan 2007. http:\/\/tools.ietf.org\/search\/rfc4787","DOI":"10.17487\/rfc4787"},{"key":"1_CR12","unstructured":"Dagon, D., Provos, N., Lee, C., Lee, W.: Corrupted DNS resolution paths: the rise of a malicious resolution authority. In: Proceedings of ISOC Network and Distributed Security Symposium (NDSS) (2008)"},{"key":"1_CR13","unstructured":"Duan, H., Weaver, N., Zhao, Z., Hu, M., Liang, J., Jiang, J., Li, K., Paxson, V.: Hold-on: Protecting against on-path DNS poisoning. In: Securing and Trusting Internet Names, IEEE (2012)"},{"key":"1_CR14","unstructured":"Measurement factory. Open DNS scanner. http:\/\/www.measurement-factory.com\/"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Schomp, K., Callahan, T., Rabinovich, M., Allman, M.: On measuring the client-side DNS infrastructure. In: Internet Measurement Conference, ACM (2013)","DOI":"10.1145\/2504730.2504734"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T14:30:06Z","timestamp":1675261806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}