{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T23:14:33Z","timestamp":1777331673478,"version":"3.51.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319700090","type":"print"},{"value":"9783319700106","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70010-6_61","type":"book-chapter","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T21:02:51Z","timestamp":1509138171000},"page":"661-668","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IPv6 OS Fingerprinting Methods: Review"],"prefix":"10.1007","author":[{"given":"Omar E.","family":"Elejla","sequence":"first","affiliation":[]},{"given":"Bahari","family":"Belaton","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]},{"given":"Basem O.","family":"Alijla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,29]]},"reference":[{"key":"61_CR1","unstructured":"ABI Research: The Internet of Things will Drive Wireless Connected Devices to 40.9 Billion in 2020. ABI Research (2014). \n                      https:\/\/www.abiresearch.com\/press\/the-internet-of-things-will-drive-wireless-connect\/"},{"key":"61_CR2","doi-asserted-by":"publisher","unstructured":"Elejla, O.E., Anbar, M., Belaton, B.: ICMPv6-based DoS and DDoS attacks and defense mechanisms. IETE Tech. Rev. 1\u201318 (2016). doi:\n                      10.1080\/02564602.2016.1192964","DOI":"10.1080\/02564602.2016.1192964"},{"key":"61_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/NECO_a_00798","volume":"28","author":"OE Elejla","year":"2016","unstructured":"Elejla, O.E., Belaton, B., Anbar, M., Alnajjar, A.: Intrusion detection systems of ICMPv6-based DDoS attacks. Neural Comput. Appl. 28, 1\u201312 (2016)","journal-title":"Neural Comput. Appl."},{"key":"61_CR4","unstructured":"Schwartzenberg, J.: Using machine learning techniques for advanced passive operating system fingerprinting. Master thesis, University of Twente (2010)"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Srisuresh, P., Egevang, K.: Traditional IP network address translator (Traditional NAT) (2000)","DOI":"10.17487\/rfc3022"},{"key":"61_CR6","unstructured":"Ornaghi, A., Valleri, M.: Ettercap (2005). \n                      http:\/\/ettercap.github.io\/ettercap\/\n                      \n                     (2017)"},{"key":"61_CR7","unstructured":"Yarochkin, F., Kydyraliev, M., Arkin, O.: Xprobe project (2014). \n                      http:\/\/x-probe.org\/\n                      \n                     (2017)"},{"key":"61_CR8","unstructured":"Lyon, G.: Nmap\u2013free security scanner for network exploration & security audits (2009). \n                      https:\/\/nmap.org\/\n                      \n                     (2017)"},{"key":"61_CR9","first-page":"1","volume":"7","author":"LG Greenwald","year":"2007","unstructured":"Greenwald, L.G., Thomas, T.J.: Toward undetected operating system fingerprinting. WOOT 7, 1\u201310 (2007)","journal-title":"WOOT"},{"key":"61_CR10","unstructured":"Stopforth, R.: Techniques and countermeasures of TCP\/IP OS fingerprinting on Linux Systems. Thesis, University of KwaZulu-Natal, Durban (2007)"},{"key":"61_CR11","unstructured":"Auffret, P.: SinFP, January 2007. \n                      http:\/\/www.gomor.org\/sinfp\n                      \n                     (2017)"},{"key":"61_CR12","doi-asserted-by":"crossref","unstructured":"Beck, F., Festor, O., Chrisment, I.: IPv6 neighbor discovery protocol based OS fingerprinting, Inria (2007)","DOI":"10.1109\/ICCGI.2007.39"},{"key":"61_CR13","unstructured":"Biondi, P.: Scapy (2011). \n                      http:\/\/www.secdev.org\/projects\/scapy\/\n                      \n                     (2015)"},{"key":"61_CR14","doi-asserted-by":"crossref","unstructured":"Matou\u0161ek, P., Ry\u0161av\u00fd, O., Gr\u00e9gr, M., Vyml\u00e1til, M.: Towards identification of operating systems from the internet traffic: IPFIX monitoring with fingerprinting and clustering. In: 2014 5th International Conference on Data Communication Networking (DCNET), pp. 1\u20137. IEEE (2014)","DOI":"10.5220\/0005099500210027"},{"issue":"4","key":"61_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s11416-009-0134-4","volume":"6","author":"G Prigent","year":"2010","unstructured":"Prigent, G., Vichot, F., Harrouet, F.: IpMorph: fingerprinting spoofing unification. J. Comput. Virol. 6(4), 329\u2013342 (2010)","journal-title":"J. Comput. Virol."},{"key":"61_CR16","unstructured":"Nerakis, E.: IPv6 host fingerprint. Master DTIC Document, Naval Postgraduate School (2006)"},{"key":"61_CR17","unstructured":"Zalewski, M.: P0f: Passive OS Fingerprinting Tool (2006). \n                      http:\/\/lcamtuf.coredump.cx\/p0f3\/\n                      \n                     (2017)"},{"key":"61_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3","volume-title":"Cyber Deception: Building the Scientific Foundation","author":"S Jajodia","year":"2016","unstructured":"Jajodia, S., Subrahmanian, V.S., Swarup, V., Wang, C.: Cyber Deception: Building the Scientific Foundation. Springer International Publishing, Switzerland (2016). doi:\n                      10.1007\/978-3-319-32699-3"},{"key":"61_CR19","doi-asserted-by":"crossref","unstructured":"Fifield, D., Geana, A., MartinGarcia, L., Morbitzer, M., Tygar, J.D.: Remote operating system classification over IPv6. In: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, pp. 57\u201367. ACM (2015)","DOI":"10.1145\/2808769.2808777"},{"key":"61_CR20","unstructured":"IRL Fingerprinting Dataset (2014). \n                      http:\/\/irl.cs.tamu.edu\/projects\/sampling\/\n                      \n                     (2017)"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70010-6_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T02:55:18Z","timestamp":1558320918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70010-6_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319700090","9783319700106"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70010-6_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"29 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IVIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Visual Informatics Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ivic2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ivic.org.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}