{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:12:01Z","timestamp":1772039521016,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319764801","type":"print"},{"value":"9783319764818","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76481-8_18","type":"book-chapter","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T23:15:28Z","timestamp":1519859728000},"page":"243-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Closer Look at IP-ID Behavior in the Wild"],"prefix":"10.1007","author":[{"given":"Flavia","family":"Salutari","sequence":"first","affiliation":[]},{"given":"Danilo","family":"Cicalese","sequence":"additional","affiliation":[]},{"given":"Dario J.","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,2]]},"reference":[{"key":"18_CR1","unstructured":"https:\/\/perso.telecom-paristech.fr\/drossi\/dataset\/IP-ID\/"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M.: A technique for counting NATted hosts. In: Proceedings of the IMW (2002)","DOI":"10.1145\/637201.637243"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Bender, A., Sherwood, R., Spring, N.: Fixing ally\u2019s growing pains with velocity modeling. In: Proceedings of the ACM IMC (2008)","DOI":"10.1145\/1452520.1452560"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-15509-8_10","volume-title":"Passive and Active Measurement","author":"R Beverly","year":"2015","unstructured":"Beverly, R., Luckie, M., Mosley, L., Claffy, K.: Measuring and characterizing IPv6 router availability. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 123\u2013135. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15509-8_10"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Braden, R.: RFC 1122, Requirements for Internet Hosts - Communication Layers (1989)","DOI":"10.17487\/rfc1122"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-31966-5_9","volume-title":"Passive and Active Network Measurement","author":"W Chen","year":"2005","unstructured":"Chen, W., Huang, Y., Ribeiro, B.F., Suh, K., Zhang, H., de Souza e Silva, E., Kurose, J., Towsley, D.: Exploiting the IPID field to infer network path and end-system characteristics. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 108\u2013120. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31966-5_9"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Benson, K., King, A., Huffaker, B., Glatz, E., Dimitropoulos, X., Richter, P., Finamore, A., Snoeren, A.C.: Lost in space: improving inference of IPv4 address space utilization. In: IEEE JSAC (2016)","DOI":"10.1109\/JSAC.2016.2559218"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Pelletier, K.S.G.: RFC 5225, RObust Header Compression Version 2 (ROHCv2): Profiles for RTP. UDP, IP, ESP and UDP-Lite (2008)","DOI":"10.17487\/rfc5225"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Herzberg, A.: Fragmentation considered vulnerable. In: ACM TISSEC (2013)","DOI":"10.1145\/2445566.2445568"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Gont, F.: RFC 6274, Security assessment of the internet protocol version 4 (2011)","DOI":"10.17487\/rfc6274"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Gont, F.: RFC 7739, Security implications of predictable fragment identification values (2016)","DOI":"10.17487\/RFC7739"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and survey of the visible internet. In: Proceedings of the ACM IMC (2008)","DOI":"10.1145\/1452520.1452542"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Shulman, H.: Fragmentation considered poisonous, or: one-domain-to-rule-them-all.org. In: IEEE CCNS (2013)","DOI":"10.1109\/CNS.2013.6682711"},{"key":"18_CR14","unstructured":"Idle scanning and related IPID games. https:\/\/nmap.org\/book\/idlescan.html"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Jaiswal, S., Iannaccone, G., Diot, C., Kurose, J., Towsley, D.: Measurement and classification of out-of-sequence packets in a tier-1 IP backbone. In: IEEE\/ACM TON (2007)","DOI":"10.1109\/TNET.2006.890117"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Keys, K., Hyun, Y., Luckie, M., Claffy, K.: Internet-scale IPv4 alias resolution with MIDAR. In: IEEE\/ACM TON (2013)","DOI":"10.1109\/TNET.2012.2198887"},{"key":"18_CR17","unstructured":"Klein, A.: OpenBSD DNS cache poisoning and multiple O\/S predictable IP ID vulnerability. Technical report (2007)"},{"key":"18_CR18","first-page":"14","volume":"1","author":"W-Y Loh","year":"2011","unstructured":"Loh, W.-Y.: Classification and regression trees. Wiley Interdiscipl. Rev.: Data Mining Knowl. Discov. 1, 14\u201323 (2011)","journal-title":"Wiley Interdiscipl. Rev.: Data Mining Knowl. Discov."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Luckie, M., Beverly, R., Brinkmeyer, W., et al.: Speedtrap: internet-scale IPv6 alias resolution. In: Proceedings of the ACM IMC (2013)","DOI":"10.1145\/2504730.2504759"},{"issue":"5","key":"18_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/1165389.945456","volume":"37","author":"R Mahajan","year":"2003","unstructured":"Mahajan, R., Spring, N., Wetherall, D., Anderson, T.: User-level internet path diagnosis. ACM SIGOPS Oper. Syst. Rev. 37(5), 106\u2013119 (2003)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Mogul, J.C., Deering, S.E.: RFC 1191, Path MTU discovery (1990)","DOI":"10.17487\/rfc1191"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Mongkolluksamee, S., Fukuda, K., Pongpaibool, P.: Counting NATted hosts by observing TCP\/IP field behaviors. In: Proceedings of the IEEE ICC (2012)","DOI":"10.1109\/ICC.2012.6364596"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Pearce, P., Ensafi, R., Li, F., Feamster, N., Paxson, V.: Augur: Internet-wide detection of connectivity disruptions. In: IEEE SP (2017)","DOI":"10.1109\/SP.2017.55"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Postel, J.: RFC 791, Internet protocol (1981)","DOI":"10.17487\/rfc0791"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Salutari, F., Cicalese, D., Rossi, D.: A closer look at IP-ID behavior in the wild (extended tech. rep.). Technical report, Telecom ParisTech (2018)","DOI":"10.1007\/978-3-319-76481-8_18"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Spring, N., Mahajan, R., Wetherall, D., Anderson, T.: Measuring ISP topologies with rocketfuel. In: IEEE\/ACM TON (2004)","DOI":"10.1109\/TNET.2003.822655"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Touch, J.: RFC 6864, Updated Specification of the IPv4 ID Field (2013)","DOI":"10.17487\/rfc6864"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"West, M.A., McCann, S.: RFC 4413, TCP\/IP field behavior (2006)","DOI":"10.17487\/rfc4413"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Zander, S., Andrew, L.L., Armitage, G.: Capturing ghosts: predicting the used IPv4 space by inferring unobserved addresses. In: Proceedings of the ACM IMC (2014)","DOI":"10.1145\/2663716.2663718"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76481-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T22:26:51Z","timestamp":1570832811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76481-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319764801","9783319764818"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76481-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}