{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:56:24Z","timestamp":1747810584167,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642236433"},{"type":"electronic","value":"9783642236440"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23644-0_11","type":"book-chapter","created":{"date-parts":[[2012,2,11]],"date-time":"2012-02-11T00:06:20Z","timestamp":1328918780000},"page":"201-221","source":"Crossref","is-referenced-by-count":4,"title":["Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack"],"prefix":"10.1007","author":[{"given":"Sheila","family":"Becker","sequence":"first","affiliation":[]},{"given":"Jeff","family":"Seibert","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Libsvm \u2013 a library for support vector machines, \n                    \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/","key":"11_CR1"},{"unstructured":"p2psim: A simulator for peer-to-peer protocols, \n                    \n                      http:\/\/pdos.csail.mit.edu\/p2psim\/","key":"11_CR2"},{"unstructured":"Planetlab: An open platform for developing, deploying, and accessing planetary-scale services, \n                    \n                      http:\/\/www.planet-lab.org","key":"11_CR3"},{"unstructured":"Weka\u2014machine learning software in java, \n                    \n                      http:\/\/sourceforge.net\/projects\/weka\/","key":"11_CR4"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1273445.1273449","volume":"37","author":"V. Aggarwal","year":"2007","unstructured":"Aggarwal, V., Feldmann, A., Scheideler, C.: Can ISPs and P2P systems co-operate for improved performance? ACM SIGCOMM Computer Communications Review (CCR)\u00a037(3), 29\u201340 (2007)","journal-title":"ACM SIGCOMM Computer Communications Review (CCR)"},{"doi-asserted-by":"crossref","unstructured":"Kaafar, M.A., Mathy, L., Turletti, T., Dabbous, W.: Real attacks on virtual networks: Vivaldi out of tune. In: Proc. of LSAD (2006)","key":"11_CR6","DOI":"10.1145\/1162666.1162672"},{"doi-asserted-by":"crossref","unstructured":"Bolzoni, D., Etalle, S., Hartel, P.H.: Panacea: Automating attack classification for anomaly-based network intrusion detection systems. In: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID 2009, pp. 1\u201320 (2009)","key":"11_CR7","DOI":"10.1007\/978-3-642-04342-0_1"},{"key":"11_CR8","volume-title":"Classification and Regression Trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth International Group, Belmont (1984)"},{"issue":"2","key":"11_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery\u00a02(2), 121\u2013167 (1998)","journal-title":"Data mining and knowledge discovery"},{"key":"11_CR10","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/978-3-642-05284-2_26","volume-title":"Security and Privacy in Communication Networks","author":"E. Chan-tin","year":"2009","unstructured":"Chan-tin, E., Feldman, D., Kim, Y.: The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol.\u00a019, pp. 448\u2013458. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Chan-Tin, E., Hopper, N.: Accurate and provably secure latency estimation with treeple. In: NDSS (2011)","key":"11_CR11","DOI":"10.1145\/1866307.1866389"},{"unstructured":"Cohen, B.: Incentives build robustness in BitTorrent. In: Proc. of P2P Economics (2003)","key":"11_CR12"},{"doi-asserted-by":"crossref","unstructured":"Costa, M., Castro, M., Rowstron, R., Key, P.: PIC: practical Internet coordinates for distance estimation. In: Proc. of ICDCS (2004)","key":"11_CR13","DOI":"10.1109\/ICDCS.2004.1281582"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-642-04342-0_3","volume-title":"RAID","author":"G.F. Cretu-Ciocarlie","year":"2009","unstructured":"Cretu-Ciocarlie, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J.: Adaptive anomaly detection via self-calibration and dynamic updating. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol.\u00a05758, pp. 41\u201360. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Dabek, F., Cox, R., Kaashoek, F., Morris, R.: Vivaldi: a decentralized network coordinate system. In: Proc. of ACM SIGCOMM (2004)","key":"11_CR15","DOI":"10.1145\/1015467.1015471"},{"doi-asserted-by":"crossref","unstructured":"Donnet, B., Gueye, B., Kaafar, M.A.: A survey on network coordinates systems, design and security. IEEE Communications Surveys and Tutorials (2009)","key":"11_CR16","DOI":"10.1109\/SURV.2010.032810.00007"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/90.958323","volume":"9","author":"P. Francis","year":"2001","unstructured":"Francis, P., Jamin, S., Jin, C., Jin, Y., Raz, D.y., Shavitt, Y., Zhang, L.: IDMaps: A Global Internet Host Distance Estimation Service. IEEE\/ACM Trans. Netw.\u00a09, 525 (2001)","journal-title":"IEEE\/ACM Trans. Netw."},{"doi-asserted-by":"crossref","unstructured":"Gummadi, K.P., Saroiu, S., Gribble, S.D.: King: Estimating latency between arbitrary internet end hosts. In: Proc. of ACM SIGCOMM-IMW (2002)","key":"11_CR18","DOI":"10.1145\/637201.637203"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15512-3_1","volume-title":"Recent Advances in Intrusion Detection","author":"I.U. Haq","year":"2010","unstructured":"Haq, I.U., Ali, S., Khan, H., Khayam, S.A.: What is the impact of p2p traffic on anomaly detection? In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 1\u201317. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Kaafar, M.A., Mathy, L., Barakatand Kave Salamatian, C., Turletti, T., Dabbous, W.: Securing internet coordinate embedding systems. In: Proc. of SIGCOMM (2007)","key":"11_CR20","DOI":"10.1145\/1282380.1282388"},{"doi-asserted-by":"crossref","unstructured":"Kaafar, M.A., Mathy, L., Turletti, T., Dabbous, W.: Virtual networks under attack: Disrupting internet coordinate systems. In: Proc. of CoNext (2006)","key":"11_CR21","DOI":"10.1145\/1368436.1368453"},{"doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: SIGCOMM (2004)","key":"11_CR22","DOI":"10.1145\/1015467.1015492"},{"unstructured":"Lehman, L., Lerman, S.: Pcoord: Network position estimation using peer-to-peer measurements. In: Proc. of NCA (2004)","key":"11_CR23"},{"doi-asserted-by":"crossref","unstructured":"Lehman, L., Lerman, S.: A decentralized network coordinate system for robust internet distance. In: Proc. of ITNG (2006)","key":"11_CR24","DOI":"10.1109\/ITNG.2006.4"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-642-04342-0_2","volume-title":"RAID","author":"F. Maggi","year":"2009","unstructured":"Maggi, F., Robertson, W., Kruegel, C., Vigna, G.: Protecting a moving target: Addressing web application concept drift. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol.\u00a05758, pp. 21\u201340. Springer, Heidelberg (2009)"},{"unstructured":"Ng, E., Zhang, H.: Predicting internet network distance with coordinates-based approaches. In: Proc. of INFOCOM (2002)","key":"11_CR26"},{"unstructured":"Ng, T.S.E., Zhang, H.: A network positioning system for the internet. In: Proc. of USENIX (2004)","key":"11_CR27"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_26","volume-title":"Peer-to-Peer Systems II","author":"M. Pias","year":"2003","unstructured":"Pias, M., Crowcroft, J., Wilbur, S., Bhatti, S., Harris, T.: Lighthouses for scalable distributed location. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, Springer, Heidelberg (2003)"},{"key":"11_CR29","volume-title":"C4.5: programs for machine learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"doi-asserted-by":"crossref","unstructured":"Rimac, I., Hilt, V., Tomsu, M., Gurbani, V., Marocco, E.: A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem. RFC 6029 (Informational) (October 2010)","key":"11_CR30","DOI":"10.17487\/rfc6029"},{"doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I.P., Nelson, B., Huang, L., Joseph, A.D., Lau, S., Rao, S., Taft, N., Tygar, J.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: IMC (2009)","key":"11_CR31","DOI":"10.1145\/1644893.1644895"},{"unstructured":"Sherr, M., Blaze, M., Thau Loo, B.: Veracity: Practical secure network coordinates via vote-based agreements. In: Proc. of USENIX ATC (2009)","key":"11_CR32"},{"doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, pp. 305\u2013316 (2010)","key":"11_CR33","DOI":"10.1109\/SP.2010.25"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-01399-7_12","volume-title":"NETWORKING 2009","author":"M. Steiner","year":"2009","unstructured":"Steiner, M., Biersack, E.W.: Where is my peer? evaluation of the vivaldi network coordinate system in azureus. In: Fratta, L., Schulzrinne, H., Takahashi, Y., Spaniol, O. (eds.) NETWORKING 2009. LNCS, vol.\u00a05550, pp. 145\u2013156. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Tang, L., Crovella, M.: Virtual landmarks for the internet. In: Proc. of SIGCOMM (2003)","key":"11_CR35","DOI":"10.1145\/948221.948223"},{"issue":"6","key":"11_CR36","first-page":"774","volume":"24","author":"V. Vapnik","year":"1963","unstructured":"Vapnik, V., Lerner, A.: Pattern recognition using generalized portrait method. Automation and Remote Control\u00a024(6), 774\u2013780 (1963)","journal-title":"Automation and Remote Control"},{"doi-asserted-by":"crossref","unstructured":"Zage, D., Nita-Rotaru, C.: On the accuracy of decentralized network coordinate systems in adversarial networks. In: Proc. of CCS (2007)","key":"11_CR37","DOI":"10.1145\/1315245.1315273"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23644-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T12:30:23Z","timestamp":1556368223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23644-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236433","9783642236440"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23644-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}