{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:10:20Z","timestamp":1743063020003,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155081"},{"type":"electronic","value":"9783319155098"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_13","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"165-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Power and Limitations of Detecting Network Filtering via Passive Observation"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Sargent","sequence":"first","affiliation":[]},{"given":"Jakub","family":"Czyz","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Allman","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Allman, M., Paxson, V., Terrell, J.: A brief history of scanning. In: Proceedings of the ACM SIGCOMM Conference on Internet Measurement, IMC\u201907 (2007)","DOI":"10.1145\/1298306.1298316"},{"key":"13_CR2","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The internet motion sensor: a distributed blackhole monitoring system. In: Proceedings of Network and Distributed System Security Symposium, NDSS\u201905, pp. 167\u2013179 (2005)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Benson, K., Dainotti, A., claffy, k., Aben, E.: Gaining insight into AS-level outages through analysis of internet background radiation. In: Traffic Monitoring and Analysis Workshop, TMA\u201913 (2013)","DOI":"10.1109\/INFCOM.2013.6567183"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Beverly, R., Berger, A., Hyun, Y., claffy, k.: Understanding the efficacy of deployed internet source address validation filtering. In: Proceedings of the ACM SIGCOMM conference on Internet Measurement, IMC\u201909 (2009)","DOI":"10.1145\/1644893.1644936"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Bush, R., Hiebert, J., Maennel, O., Roughan, M., Uhlig, S.: Testing the reachability of (new) address space. In: Proceedings of the SIGCOMM workshop on Internet Network Management, INM\u201907, pp. 236\u2013241. ACM, New York (2007)","DOI":"10.1145\/1321753.1321756"},{"key":"13_CR6","unstructured":"CAIDA: Conficker\/Conflicker\/Downadup as seen from the UCSD Network Telescope. http:\/\/www.caida.org\/research\/security\/ms08-067\/conficker.xml (2013)"},{"key":"13_CR7","unstructured":"Chien, E.: Downadup: attempts at smart network scanning. http:\/\/www.symantec.com\/connect\/blogs\/downadup-attempts-smart-network-scanning (2009)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Choffnes, D.R., Bustamante, F.E., Ge, Z.: Crowdsourcing service-level network event monitoring. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM\u201910 (2010)","DOI":"10.1145\/1851182.1851228"},{"key":"13_CR9","unstructured":"Comcast: Blocked ports list. https:\/\/customer.comcast.com\/help-and-support\/internet\/list-of-blocked-ports\/"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Squarcella, C., Aben, E., Claffy, K.C., Chiesa, M., Russo, M., Pescap\u00e9, A.: Analysis of country-wide internet outages caused by censorship. In: IMC \u201911 (2011)","DOI":"10.1145\/2068816.2068818"},{"key":"13_CR11","unstructured":"F-Secure: Threat Report H1 2014. http:\/\/www.f-secure.com\/documents\/996508\/1030743\/Threat_Report_H1_2014.pdf (2014)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Kreibich, C., Weaver, N., Nechaev, B., Paxson, V.: Netalyzr: illuminating the edge network. In: Proceedings of the ACM SIGCOMM Conference on Internet Measurement, IMC\u201910 (2010)","DOI":"10.1145\/1879141.1879173"},{"key":"13_CR13","unstructured":"Kristoff, J.: Experiences with conficker c sinkhole operation and analysis. In: Proceedings of Australian Computer Emergency Response Team Conference (2009)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of internet background radiation. In: Proceedings of the ACM SIGCOMM conference on Internet Measurement, IMC\u201904 (2004)","DOI":"10.1145\/1028788.1028794"},{"key":"13_CR15","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: An analysis of conficker\u2019s logic and rendezvous points. Technical report, SRI International (2009)"},{"key":"13_CR16","unstructured":"Richard, M., Ligh, M.: Making fun of your malware. In: Defcon 17 (2009)"},{"key":"13_CR17","unstructured":"University of Oregon: Route Views project. http:\/\/www.routeviews.org\/"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Wustrow, E., Karir, M., Bailey, M., Jahanian, F., Houston, G.: Internet background radiation revisited. In: Proceedings of the ACM SIGCOMM Conference on Internet Measurement, IMC\u201910 (2010)","DOI":"10.1145\/1879141.1879149"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T05:04:21Z","timestamp":1674191061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}