{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:38:15Z","timestamp":1761975495350,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319200330"},{"type":"electronic","value":"9783319200347"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20034-7_12","type":"book-chapter","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:25:48Z","timestamp":1433359548000},"page":"113-125","source":"Crossref","is-referenced-by-count":12,"title":["How Asymmetric Is the Internet?"],"prefix":"10.1007","author":[{"given":"Wouter","family":"de Vries","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Jair","family":"Santanna","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Sperotto","sequence":"additional","affiliation":[]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/363958.363994","volume":"7","author":"F.J. Damerau","year":"1964","unstructured":"Damerau, F.J.: A technique for computer detection and correction of spelling errors. Communications of the ACM\u00a07(3), 171\u2013176 (1964)","journal-title":"Communications of the ACM"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (Best Current Practice) (2000), \n                      \n                        http:\/\/www.ietf.org\/rfc\/rfc2827.txt","DOI":"10.17487\/rfc2827"},{"key":"12_CR3","unstructured":"He, Y.H.Y., Chen, W.C.W., Xiao, B.X.B., Peng, W.P.W.: An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. In: 11th International Conference on Parallel and Distributed Systems (ICPADS 2005) (February 2005)"},{"key":"12_CR4","unstructured":"He, Y., Faloutsos, M., Krishnamurthy, S., Huffaker, B.: On routing asymmetry in the Internet. In: Global Telecommunications Conference, GLOBECOM 2005, vol.\u00a02, p. 6. IEEE (November 2005)"},{"key":"12_CR5","unstructured":"He, Y., Faloutsos, M., Krishnamurthy, S.V.: Quantifying routing asymmetry in the Internet at the AS level. In: GLOBECOM, pp. 1474\u20131479. IEEE (2004), \n                      \n                        http:\/\/dblp.uni-trier.de\/db\/conf\/globecom\/globecom2004.html#HeFK04"},{"key":"12_CR6","unstructured":"Iputils: ping(8) (2014), \n                      \n                        http:\/\/man7.org\/linux\/man-pages\/man8\/ping.8.html"},{"key":"12_CR7","unstructured":"Katz-Bassett, E., Madhyastha, H., Adhikari, V.: Reverse traceroute. In: Network Systems Design and Implementation (2010), \n                      \n                        https:\/\/www.usenix.org\/legacy\/event\/nsdi10\/tech\/full_papers\/katz-bassett.pdf"},{"key":"12_CR8","first-page":"707","volume":"10","author":"V.I. Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady\u00a010, 707\u2013710 (1966)","journal-title":"Soviet Physics Doklady"},{"key":"12_CR9","first-page":"25","volume-title":"Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 1996","author":"V. Paxson","year":"1996","unstructured":"Paxson, V.: End-to-end Routing Behavior in the Internet. In: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 1996, pp. 25\u201338. ACM, New York (1996), \n                      \n                        http:\/\/doi.acm.org\/10.1145\/248156.248160"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Schwartz, Y., Shavitt, Y., Weinsberg, U.: On the Diversity, Stability and Symmetry of End-to-End Internet Routes. In: INFOCOM IEEE Conference on Computer Communications Workshops 2010, pp. 1\u20136 (2010)","DOI":"10.1109\/INFCOMW.2010.5466669"}],"container-title":["Lecture Notes in Computer Science","Intelligent Mechanisms for Network Configuration and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20034-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:08:49Z","timestamp":1559938129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20034-7_12"}},"subtitle":["A Study to Support the Use of Traceroute"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319200330","9783319200347"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20034-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}