{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:35:32Z","timestamp":1725550532201},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123641"},{"type":"electronic","value":"9783642123658"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12365-8_1","type":"book-chapter","created":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T09:49:15Z","timestamp":1269251355000},"page":"1-16","source":"Crossref","is-referenced-by-count":8,"title":["Understanding and Preparing for DNS Evolution"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Castro","sequence":"first","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"John","sequence":"additional","affiliation":[]},{"given":"Duane","family":"Wessels","sequence":"additional","affiliation":[]},{"given":"Kimberly","family":"Claffy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"List of root servers, http:\/\/www.root-servers.org\/ (accessed 2009.11.20)"},{"key":"1_CR2","unstructured":"NetAcuity, http:\/\/www.digital-element.net (accessed 2009.11.20)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. RFC 4033 (2005)","DOI":"10.17487\/rfc4033"},{"key":"1_CR4","unstructured":"CAIDA. Visualizing IPv6 AS-level Internet Topology (2008), http:\/\/www.caida.org\/research\/topology\/as_core_network\/ipv6.xml (2009.11.20)"},{"key":"1_CR5","unstructured":"CAIDA and DNS-OARC. A Report on DITL data gathering (January 9-10, 2007), http:\/\/www.caida.org\/projects\/ditl\/summary-2007-01\/ (accessed 2009.11.20)"},{"key":"1_CR6","unstructured":"CAIDA\/WIDE. What researchers would like to learn from the ditl project (2008), http:\/\/www.caida.org\/projects\/ditl\/questions\/ (accessed 2009.11.20)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Castro, S., Wessels, D., Fomenkov, M., claffy, k.: A Day at the Root of the Internet. In: ACM SIGCOMM Computer Communications Review, CCR (2008)","DOI":"10.1145\/1452335.1452341"},{"key":"1_CR8","unstructured":"N. R. Council. Looking over the Fence: A Neighbor\u2019s View of Networking Research. National Academies Press, Washington (2001)"},{"key":"1_CR9","unstructured":"DNS-OARC. DNS-DITL (2009), participants, https:\/\/www.dns-oarc.net\/oarc\/data\/ditl\/2009 (2009.11.20)"},{"key":"1_CR10","unstructured":"Gibbard, S.: Observations on Anycast Topology and Performance (2007), http:\/\/www.pch.net\/resources\/papers\/anycast-performance\/anycast-performance-v10.pdf (2009.11.20)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-00975-4_2","volume-title":"Passive and Active Network Measurement","author":"E. Karpilovsky","year":"2009","unstructured":"Karpilovsky, E., Gerber, A., Pei, D., Rexford, J., Shaikh, A.: Quantifying the Extent of IPv6 Deployment. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 13\u201322. Springer, Heidelberg (2009)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Larson, M., Barber, P.: Observed DNS Resolution Misbehavior. RFC 4697 (2006)","DOI":"10.17487\/rfc4697"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-71617-4_13","volume-title":"Passive and Active Network Measurement","author":"Z. Liu","year":"2007","unstructured":"Liu, Z., Huffaker, B., Brownlee, N., claffy, k.: Two Days in the Life of the DNS Anycast Root Servers. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol.\u00a04427, pp. 125\u2013134. Springer, Heidelberg (2007)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names - implementation and specification. RFC 1035, Standard (1987)","DOI":"10.17487\/rfc1035"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.J., Lear, E.: Address Allocation for Private Internets. RFC 1918 (1996)","DOI":"10.17487\/rfc1918"},{"key":"1_CR16","unstructured":"Team Cymru. Ip to asn mapping, http:\/\/www.team-cymru.org\/Services\/ip-to-asn.html (accessed 2009.11.20)"},{"key":"1_CR17","unstructured":"US-CERT. Vulnerability note vu#800113: Multiple dns implementations vulnerable to cache poisonings, http:\/\/www.kb.cert.org\/vuls\/id\/800113 (2009.11.20)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Vixie, P.: Extension Mechanisms for DNS (EDNS0). RFC\u00a02671 (1999)","DOI":"10.17487\/rfc2671"},{"key":"1_CR19","unstructured":"Vixie, P.: Reasons for deploying DNSSEC (2008), http:\/\/www.dnssec.net\/why-deploy-dnssec (2009.11.20)"},{"key":"1_CR20","unstructured":"Watson, P.: Slipping in the Window: TCP Reset attacks (2004), http:\/\/osvdb.org\/ref\/04\/04030-SlippingInTheWindow_v1.0.doc (2009.11.20)"},{"key":"1_CR21","unstructured":"Wessels, D.: DNS port randomness test, https:\/\/www.dns-oarc.net\/oarc\/services\/dnsentropy (2009.11.20)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Wessels, D.: Is your caching resolver polluting the internet? In: ACM SIGCOMM Workshop on Network Troubleshooting, Netts 2004 (2004)","DOI":"10.1145\/1016687.1016695"},{"key":"1_CR23","unstructured":"Wessels, D., Fomenkov, M.: Wow, that\u2019s a lot of packets. In: Passive and Active Measurement Workshop (PAM) 2002, Fort Collins, USA (2002)"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12365-8_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:53:33Z","timestamp":1606168413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12365-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123641","9783642123658"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12365-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}