{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T18:06:14Z","timestamp":1745863574800,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_13","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"243-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Network Counter-Attack Strategy by Topology Map Analysis"],"prefix":"10.1007","author":[{"given":"Hidema","family":"Tanaka","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"4","key":"13_CR1","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2006.02.009","volume":"25","author":"H Artail","year":"2006","unstructured":"Artail, H., Safa, H., Sraj, M., Kuwatly, L., Al-Masri, Z.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. J. Comput. Secur. 25(4), 274\u2013288 (2006)","journal-title":"J. Comput. Secur."},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-09620-9_17","volume-title":"Structural Information and Communication Complexity","author":"D Bil\u00f2","year":"2014","unstructured":"Bil\u00f2, D., Gual\u00e0, L., Leucci, S., Proietti, G.: Network creation games with traceroute-based strategies. In: Halld\u00f3rsson, M.M. (ed.) SIROCCO 2014. LNCS, vol. 8576, pp. 210\u2013223. Springer, Heidelberg (2014). doi:\n                      10.1007\/978-3-319-09620-9_17"},{"key":"13_CR3","unstructured":"Center for Applied Internet Data Analysis, \n                      http:\/\/www.caida.org\/\n                      \n                    . Accessed 15 Jan 2016"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/11527954_13","volume-title":"Combinatorial and Algorithmic Aspects of Networking","author":"L Dall\u2019Asta","year":"2005","unstructured":"Dall\u2019Asta, L., Alvarez-Hamelin, I., Barrat, A., V\u00e1zquez, A., Vespignani, A.: Traceroute-like exploration of unknown networks: a statistical analysis. In: L\u00f3pez-Ortiz, A., Hamel, A.M. (eds.) CAAN 2004. LNCS, vol. 3405, pp. 140\u2013153. Springer, Heidelberg (2005). doi:\n                      10.1007\/11527954_13"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1145\/316194.316229","volume":"2","author":"M Faloutsos","year":"1999","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the Internet topology. Comput. Commun. Rev. 2, 251\u2013262 (1999)","journal-title":"Comput. Commun. Rev."},{"issue":"18","key":"13_CR6","doi-asserted-by":"publisher","first-page":"188701.1","DOI":"10.1103\/PhysRevLett.94.188701","volume":"94","author":"LK Gallos","year":"2005","unstructured":"Gallos, L.K., Cohen, R., Argyrakis, P., Bunde, A., Havlin, S.: Stability and topology of scale-free networks under attack and strategies. Phys. Rev. Lett. 94(18), 188701.1\u2013188701.4 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Gomez, S., Diaz-Guilera, A., Gomez-Gardenes, J., Perez-Vincente, C.J., Merono, Y., Arenas, A.: Diffusion dynamics on multiple networks. Phys. Rev. Lett. 110(2), 028701.1\u2013028701.5 (2013)","DOI":"10.1103\/PhysRevLett.110.028701"},{"issue":"5","key":"13_CR8","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1541\/ieejjournal.130.293","volume":"130","author":"Y Hayashi","year":"2010","unstructured":"Hayashi, Y.: Robust information communication networks based on network scientific approaches. IEEJ J. 130(5), 293\u2013296 (2010)","journal-title":"IEEJ J."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Inoue, D., Eto, M., Yoshioka, K., Baba, S., Suzuki, K., Nakazato, J., Ohtaka, K., Nakao, K.: Nicter: an incident analysis system toward binding network monitoring with malware analysis. Information Security Threats Data Collection and Sharing 2008, pp. 58\u201366 (2008)","DOI":"10.1109\/WISTDCS.2008.14"},{"key":"13_CR10","unstructured":"The Internet Assigned Numbers Authority (IANA). \n                      http:\/\/www.iana.org\/\n                      \n                    . Accessed 27 Jan 2016"},{"key":"13_CR11","unstructured":"Internet Engineering Task Force (IETF) RFC: 791 INTERNET PROTOCOL. \n                      https:\/\/www.ietf.org\/rfc\/rfc791.txt\n                      \n                    . Accessed 15 Jan 2016"},{"key":"13_CR12","unstructured":"ISO, IEC 10731: 1994 Information technology - Open Systems Interconnection - Basic Reference Model - Conventions for the definition of OSI services"},{"issue":"6","key":"13_CR13","first-page":"2009","volume":"52","author":"K Kisamori","year":"2011","unstructured":"Kisamori, K., Shimoda, A., Mori, T., Goto, S.: Analysis of malicious traffic based on TCP fingerprinting. IPSJ J. 52(6), 2009\u20132018 (2011)","journal-title":"IPSJ J."},{"issue":"1","key":"13_CR14","first-page":"012812.1","volume":"90","author":"F Luca","year":"2011","unstructured":"Luca, F., Paolo, B., Mario, G.: Interplay of network dynamics and heterogeneity of ties on spreading dynamics. Phys. Rev. E 90(1), 012812.1\u2013012812.9 (2011)","journal-title":"Phys. Rev. E"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Namatame, A., Zamami, R.: Systemic Risk on least susceptible network. In: Artificial Economics and Self-organization. LNEMS, vol. 669, pp. 245\u2013256. Springer (2013)","DOI":"10.1007\/978-3-319-00912-4_19"},{"key":"13_CR16","unstructured":"National Institute of Information and Communications Technology, JAPAN (NICT), \u201cnicterweb.\u201d \n                      http:\/\/www.nicter.jp\/\n                      \n                    . Accessed 15 Jan 2016"},{"key":"13_CR17","first-page":"028701","volume":"87","author":"R Pastor-Satorras","year":"2000","unstructured":"Pastor-Satorras, R., Smith, E., Sole, R.V.: Dynamical and correlation properties of the Internet. Phys. Rev. Lett. 87, 028701 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1\u20133","key":"13_CR18","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.laa.2005.01.011","volume":"401","author":"O Rojo","year":"2005","unstructured":"Rojo, O., Soto, R.: The spectra of the adjacency matrix and Laplacian matrix for some balanced trees. Linear Algebra Appl. 401(1\u20133), 97\u2013117 (2005)","journal-title":"Linear Algebra Appl."},{"issue":"2","key":"13_CR19","first-page":"644","volume":"48","author":"D Takeo","year":"2007","unstructured":"Takeo, D., Ito, M., Suzuki, H., Okazaki, N., Watanabe, A.: \u201cA Proposal of a Detection Technique on Stepping-stone Attacks Using\u201d, connection-based method. IPSJ J. 48(2), 644\u2013655 (2007)","journal-title":"IPSJ J."},{"key":"13_CR20","unstructured":"Tomita, Y., Nakao, A.: Inferring an AS Path from an incomplete Traceroute. J. Inst. Electron. Inf. Commun. Eng. 109(273(NS2009 103\u2013119)), 17\u201322 (2009)"},{"key":"13_CR21","unstructured":"U.S.A., Norse corporation. \n                      http:\/\/www.norse-corp.com\/\n                      \n                    . Accessed 15 Jan 2016"},{"issue":"1\u20133","key":"13_CR22","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.laa.2004.12.014","volume":"402","author":"WC Wu","year":"2005","unstructured":"Wu, W.C.: On Rayleigh-Ritz ratios of a generalized Laplacian matrix of directed graphs. Linear Algebra Appl. 402(1\u20133), 207\u2013227 (2005)","journal-title":"Linear Algebra Appl."},{"key":"13_CR23","unstructured":"Yokota, R., Okubo, R., Sone, N., Morii, M.: The affect of the honeypot on the darknet observation, part 2. IEICE Tech. Rep. 2013-GN-88(16), 1\u20134 (2013)"},{"key":"13_CR24","unstructured":"Zhou, Q., Li, Z.: Empirical determination of geometric parameters for selective omission in a road network. Int. J. Geogr. Inf. Sci. 30(2), 263\u2013299 (2016). Taylor & Francis"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:39:02Z","timestamp":1558316342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}