{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:48:01Z","timestamp":1755838081998},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_5","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"58-77","source":"Crossref","is-referenced-by-count":9,"title":["Analyzing Network-Aware Active Wardens in IPv6"],"prefix":"10.1007","author":[{"given":"Grzegorz","family":"Lewandowski","sequence":"first","affiliation":[]},{"given":"Norka B.","family":"Lucena","sequence":"additional","affiliation":[]},{"given":"Steve J.","family":"Chapin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"The IPv6 Portal (Retrieved on June 22, 2005) from the World Wide Web (2005), http:\/\/www.ist-ipv6.org\/"},{"key":"5_CR2","unstructured":"Press Trust of India. TRAI wants govt to kickstart shift to ipv6 through e-gov (2005), http:\/\/www.hindustantimes.com\/news\/181_1578124,00020020.htm"},{"key":"5_CR3","unstructured":"ChinaView. China, EU to build wide-band network (Retrieved on January 12, 2006) from the World Wide Web (2006), http:\/\/news.xinhuanet.com\/english\/2006-01\/12\/content_4045153.htm"},{"key":"5_CR4","unstructured":"United States IPv6 Summit (Retrieved on November 05, 2005) from the World Wide Web (2005), http:\/\/www.usipv6.com\/"},{"key":"5_CR5","unstructured":"Global Summit IPv6 (Retrieved on May 17, 2005) from the World Wide Web (2005), http:\/\/www.ipv6-es.com\/05\/in\/i-intro.php"},{"key":"5_CR6","unstructured":"IPv6 Forum Korea (Retrieved on October 13, 2005) from the World Wide Web (2005), http:\/\/www.ipv6.or.kr\/"},{"key":"5_CR7","unstructured":"Luxembourg IPv6 Summit 2005 (Retrieved on June 22, 2005) from the World Wide Web (2005), http:\/\/wiki.uni.lu\/ipv6\/Luxembourg+IPv6+Summit+2005.html"},{"key":"5_CR8","unstructured":"Evans, K.S.: Memorandum for the chief information officers, M-05-22 (2005), http:\/\/www.whitehouse.gov\/omb\/memoranda\/fy2005\/m05-22.pdf"},{"key":"5_CR9","unstructured":"United States Government Accountability Office. Internet protocol version 6: Federal agencies need to plan for transition and manage security risks. Technical Report GAO-05-471 (2005), http:\/\/www.gao.gov\/new.items\/d05471.pdf"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Lucena, N.B., Lewandowski, G., Chapin, S.J.: Covert Channels in IPv6. In: Proceedings of the 5 th Workshop on Privacy Enhancing Technologies, Dubrovnik (Cavtat), Croatia (2005)","DOI":"10.1007\/11767831_10"},{"key":"5_CR11","unstructured":"Handley, M., Paxson, V.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10 th USENIX Security Symposium, Washington, DC, USA, USENIX Association (2001)"},{"key":"5_CR12","unstructured":"horizon<jmcdonal@unf.edu>: Defeating sniffers and intrusion detection systems. Phrack Magazine 8(54) (Retrieved on May 13, 2005) from the World Wide Web (1998), http:\/\/www.phrack.org\/phrack\/54\/P54-10"},{"key":"5_CR13","first-page":"1381","volume-title":"Proceedings of the IEEE INFOCOM 2002 Conference","author":"G.R. Malan","year":"2000","unstructured":"Malan, G.R., Watson, D., Jahanian, F., Howell, P.: Transport and Application Protocol Scrubbing. In: Proceedings of the IEEE INFOCOM 2002 Conference, Tel-Aviv, Israel, pp. 1381\u20131390. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"5_CR14","first-page":"44","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy","author":"U. Shankar","year":"2003","unstructured":"Shankar, U., Paxson, V.: Active Mapping: Resisting NIDS Evasion without Altering Traffic. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 44\u201361. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1145\/1030083.1030108","volume-title":"Proceedings of the 11 th ACM Conference on Computer and Communications Security","author":"S. Cabuk","year":"2004","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP Covert Timing Channels: Design and Detection. In: Proceedings of the 11 th ACM Conference on Computer and Communications Security, Washington DC, USA, pp. 178\u2013187. ACM Press, New York (2004)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Information Hiding","author":"T. Handel","year":"1996","unstructured":"Handel, T., Sandford, M.: Hiding data in the OSI network model. In: Anderson, R. (ed.) Information Hiding. LNCS, vol.\u00a01174, pp. 23\u201338. Springer, Heidelberg (1996)"},{"key":"5_CR17","unstructured":"Abad, C.: IP checksum covert channels and selected hash collision (Retrieved on January 3, 2005) from the World Wide Web (2001), http:\/\/gray-world.net\/cn\/papers\/ipccc.pdf"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1005140.1005152","volume-title":"Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society","author":"M. Bauer","year":"2003","unstructured":"Bauer, M.: New Covert Channels in HTTP - Adding Unwitting Web Browsers to Anonymity Sets. In: Samarati, P., Syverson, P. (eds.) Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, pp. 72\u201378. ACM Press, New York (2003)"},{"key":"5_CR19","unstructured":"daemon9 (route@infonexus.com): Loki2 (the implementation). Phrack Magazine 51, article 6 (Retrieved on August 27, 2002) from the World Wide Web (1997), http:\/\/www.phrack.org\/show.php?p=51&a=6"},{"key":"5_CR20","unstructured":"daemon9 (route@infonexus.com), alhambra (alhambra@infornexus.com): Project loki. Phrack Magazine 49, article 6 (Retrieved on August 27, 2002) from the World Wide Web (1996), http:\/\/www.phrack.org\/show.php?p=49&a=6"},{"key":"5_CR21","unstructured":"Dunigan, T.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998), [ORNL\/TM-limited distribution]"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-36467-6_15","volume-title":"Privacy Enhancing Technologies","author":"J. Giffin","year":"2003","unstructured":"Giffin, J., Greenstadt, R., Litwack, P., Tibbetts, R.: Covert Messaging through TCP Timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 194\u2013208. Springer, Heidelberg (2003)"},{"key":"5_CR23","unstructured":"Ka0ticSH: Diggin em walls (part 3) - advanced\/other techniques for bypassing firewalls. New Order(Retrieved on August 28, 2002) from the World Wide Web (2002), http:\/\/neworder.box.sk\/newsread.php?newsid=3957"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. Psionics Technologies (Retrieved on November 13, 2004) from the World Wide Web (1996), http:\/\/www.firstmonday.dk\/issues\/issue2_5\/rowland\/","DOI":"10.5210\/fm.v2i5.528"},{"key":"5_CR25","unstructured":"Ahsan, K.: Covert channel analysis and data hiding in TCP\/IP. Master\u2019s thesis, University of Toronto (2002)"},{"key":"5_CR26","volume-title":"Proceedings of the ACM Workshop on Multimedia Security at ACM Multimedia","author":"K. Ahsan","year":"2002","unstructured":"Ahsan, K., Kundur, D.: Practical Data Hiding in TCP\/IP. In: Proceedings of the ACM Workshop on Multimedia Security at ACM Multimedia, ACM Press, New York (2002)"},{"key":"5_CR27","unstructured":"Servetto, S.D., Vetterli, M.: Codes for the Fold-Sum Channel. In: Proceedings of the 35 th Annual Conference on Information Science and Systems (CISS), Baltimore, MD, USA (2001)"},{"key":"5_CR28","volume-title":"Proceedings of the IEEE International Symposium on Information Theory (ISIT)","author":"S.D. Servetto","year":"2001","unstructured":"Servetto, S.D., Vetterli, M.: Communication using Phantoms: Covert Channels in the Internet. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT), Washington, DC, USA, IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-61996-8_30","volume-title":"Information Hiding","author":"R. Anderson","year":"1996","unstructured":"Anderson, R.: Stretching the Limits of Steganography. In: Anderson, R. (ed.) Information Hiding. LNCS, vol.\u00a01174, pp. 39\u201348. Springer, Heidelberg (1996)"},{"key":"5_CR30","first-page":"474","volume-title":"IEEE Journal of Selected Areas in Communications:Special Issue on Copyright and Privacy Protection","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. In: IEEE Journal of Selected Areas in Communications:Special Issue on Copyright and Privacy Protection, pp. 474\u2013481. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S. Craver","year":"1998","unstructured":"Craver, S.: On Public-Key Steganography in the Presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 355\u2013368. Springer, Heidelberg (1998)"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36415-3_2","volume-title":"Information Hiding","author":"G. Fisk","year":"2003","unstructured":"Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 29\u201346. Springer, Heidelberg (2003)"},{"key":"5_CR33","unstructured":"Cisco. Cisco IOS Net Flow (Retrieved on November 17, 2005) from the World Wide Web (2005), http:\/\/www.cisco.com\/en\/US\/products\/ps6601\/products_ios_protocol_group_home.html"},{"key":"5_CR34","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"L. Deri","year":"2000","unstructured":"Deri, L., Suin, S.: Improving Network Security Using Ntop. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, Springer, Heidelberg (2000)"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Case, J., Fedor, M., Schoffstall, M., Davin, J.: A simple network management protocol (SNMP), RFC 1157 (Retrieved on January 13, 2005) from the World Wide Web (1990), http:\/\/www.ietf.org\/rfc\/rfc1157.txt","DOI":"10.17487\/rfc1157"},{"key":"5_CR36","unstructured":"IBM. Tivoli Net View (Retrieved on November 17, 2005) from the World Wide Web (2005), http:\/\/www-306.ibm.com\/software\/tivoli\/products\/netview\/"},{"key":"5_CR37","unstructured":"HP. Network node manager advanced edition (Retrieved on November 17, 2005) from the World Wide Web (2005), http:\/\/www.managementsoftware.hp.com\/products\/nnm\/index.html"},{"key":"5_CR38","unstructured":"Sun. Solstice site manager (Retrieved on November 17, 2005) from the World Wide Web (2005), http:\/\/www.sun.com\/software\/solstice\/sm\/index.xml"},{"key":"5_CR39","unstructured":"Doyle, J.: Routing TCP\/IP, vol.\u00a0I. Cisco Press, Indianapollis, IN 46240 (1998)"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Technical report (1949)","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"5_CR41","unstructured":"Deering, S., Hinden, R.: Internet protocol, version 6 (IPv6) specification, RFC 2460 (Retrieved on October 08, 2004) from the World Wide Web (1998), http:\/\/www.ietf.org\/rfc\/rfc2460.txt?number=2460"},{"key":"5_CR42","unstructured":"Hinde, R., Deering, S.: IP version 6 addressing architecture, RFC 2373 (Retrieved on October 08, 2004) from the World Wide Web (1998) , http:\/\/www.ietf.org\/rfc\/rfc2373.txt?number=2373"},{"key":"5_CR43","unstructured":"IANA. Internet Protocol version 6 address space (Retrieved on October 29, 2005) from the World Wide Web (2005), http:\/\/www.iana.org\/assignments\/ipv6-address-space"},{"key":"5_CR44","unstructured":"IANA. IP version 6 parameters (Retrieved on October 28, 2004) from the World Wide Web (2004), http:\/\/www.iana.org\/assignments\/ipv6-parameters"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:23Z","timestamp":1619518283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}