{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:58:21Z","timestamp":1743130701680,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319764801"},{"type":"electronic","value":"9783319764818"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76481-8_12","type":"book-chapter","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T23:15:28Z","timestamp":1519859728000},"page":"158-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Unintended Consequences of Email Spam Prevention"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Scheffler","sequence":"first","affiliation":[]},{"given":"Sean","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Yossi","family":"Gilad","sequence":"additional","affiliation":[]},{"given":"Sharon","family":"Goldberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,2]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P.: Mitigating DNS DoS attacks. In: Proceedings of Computer and Communications Security, pp. 189\u2013198. ACM (2008)","DOI":"10.1145\/1455770.1455796"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Borgwart, A., Shulman, H., Waidner, M.: Towards automated measurements of internet\u2019s naming infrastructure. In: Software Science, Technology and Engineering (SWSTE), pp. 117\u2013124. IEEE (2016)","DOI":"10.1109\/SWSTE.2016.25"},{"key":"12_CR3","unstructured":"The SPF Council. Sender Policy Framework, April 2014. http:\/\/www.openspf.org\/"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Dagon, D., Antonakakis, M., Vixie, P., Jinmei, T., Lee, W.: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. In: Proceedings of Computer and Communications Security, pp. 211\u2013222. ACM (2008)","DOI":"10.1145\/1455770.1455798"},{"key":"12_CR5","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: King, S.T. (ed.) USENIX Security Symposium, pp. 605\u2013620. USENIX Association (2013). ISBN:978-1-931971-03-4"},{"key":"12_CR6","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Kasten, J., Bursztein, E., Lidzborski, N., Thomas, K., Eranti, V., Bailey, M., Halderman, J.A.: Neither snow nor rain nor MITM: an empirical analysis of email delivery security. In: Internet Measurement Conference, pp. 27\u201339. ACM (2015). http:\/\/dl.acm.org\/citation.cfm?id=2815675 . ISBN:978-1-4503-3848-6"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Foster, I.D., Larson, J., Masich, M., Snoeren, A.C., Savage, S., Levchenko, K.: Security by any other name: on the effectiveness of provider based email security. In: Proceedings of Computer and Communications Security, pp. 450\u2013464. ACM (2015)","DOI":"10.1145\/2810103.2813607"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Gojmerac, I., Zwickl, P., Kovacs, G., Steindl, C.: Large-scale active measurements of DNS entries related to e-mail system security. In: International Conference on Communications, pp. 7426\u20137432, June 2015. https:\/\/doi.org\/10.1109\/ICC.2015.7249513","DOI":"10.1109\/ICC.2015.7249513"},{"issue":"8","key":"12_CR9","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1016\/j.cose.2009.05.002","volume":"28","author":"A Herzberg","year":"2009","unstructured":"Herzberg, A.: DNS-based email sender authentication mechanisms: a critical review. Comput. Secur. 28(8), 731\u2013742 (2009)","journal-title":"Comput. Secur."},{"key":"12_CR10","unstructured":"Holz, R., Amann, J., Mehani, O., Wachs, M., K\u00e2afar, M.A.: TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. CoRR, abs\/1511.00341 (2015). http:\/\/arxiv.org\/abs\/1511.00341"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Hubert, A., van Mook, R.: Measures for Making DNS More Resilient against Forged Answers. RFC 5452 (Proposed Standard), January 2009. http:\/\/www.ietf.org\/rfc\/rfc5452.txt","DOI":"10.17487\/rfc5452"},{"key":"12_CR12","unstructured":"Huston, G.: IPv6 and the DNS, October 2016. https:\/\/blog.apnic.net\/2016\/10\/20\/ipv6-and-the-dns\/"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-89173-4_16","volume-title":"Critical Information Infrastructures Security","author":"G Kambourakis","year":"2008","unstructured":"Kambourakis, G., Moschos, T., Geneiatakis, D., Gritzalis, S.: Detecting DNS amplification attacks. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 185\u2013196. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89173-4_16"},{"key":"12_CR14","unstructured":"Kaminsky, D.: Its the End of the Cache as we Know It. Black-Hat USA (2008)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Kitterman, S.: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. RFC 7208 (Proposed Standard), April 2014. http:\/\/www.ietf.org\/rfc\/rfc7208.txt . Updated by RFC 7372","DOI":"10.17487\/rfc7208"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Klein, A., Shulman, H., Waidner, M.: Internet-wide study of DNS cache injections. In: INFOCOM, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057202"},{"key":"12_CR17","unstructured":"K\u00fchrer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of amplification DDoS attacks. In: USENIX Security Symposium, pp. 111\u2013125 (2014)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Malatras, A., Coisel, I., Sanchez, I.: Technical recommendations for improving security of email communications. In: Information and Communication Technology, Electronics and Microelectronics, pp. 1381\u20131386. IEEE (2016)","DOI":"10.1109\/MIPRO.2016.7522355"},{"issue":"2","key":"12_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/1132026.1132027","volume":"24","author":"D Moore","year":"2006","unstructured":"Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2), 115\u2013139 (2006)","journal-title":"ACM Trans. Comput. Syst."},{"key":"12_CR20","unstructured":"Mori, T., Sato, K., Takahashi, Y., Ishibashi, K.: How is e-mail sender authentication used and misused? In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011, pp. 31\u201337. ACM, New York (2011). http:\/\/doi.acm.org\/10.1145\/2030376.2030380 . ISBN:978-1-4503-0788-8"},{"issue":"3","key":"12_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V Paxson","year":"2001","unstructured":"Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput. Commun. Rev. 31(3), 38\u201347 (2001)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"12_CR22","unstructured":"Schlitt, W.: libspf2 - SPF Library. https:\/\/www.libspf2.org\/"},{"key":"12_CR23","unstructured":"Schomp, K., Callahan, T., Rabinovich, M., Allman, M.: On measuring the client-side DNS infrastructure. In: Proceedings of Internet Measurement Conference, pp. 77\u201390. ACM, New York (2013). http:\/\/doi.acm.org\/10.1145\/2504730.2504734 . ISBN:978-1-4503-1953-9"},{"key":"12_CR24","unstructured":"Sisson, G.: DNS Survey, The Measurement Factory, November 2010. http:\/\/dns.measurement-factory.com\/surveys\/201010\/dns_survey_2010.pdf"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Wong, M., Schlitt, W.: Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1. RFC 4408 (Experimental), April 2006. Obsoleted by RFC 7208, updated by RFC 6652. http:\/\/www.ietf.org\/rfc\/rfc4408.txt","DOI":"10.17487\/rfc4408"},{"issue":"4","key":"12_CR26","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76481-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T22:26:37Z","timestamp":1570832797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76481-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319764801","9783319764818"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76481-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}