{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:43:00Z","timestamp":1742956980274,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789812872500"},{"type":"electronic","value":"9789812872517"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-287-251-7_67","type":"book-chapter","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T13:03:18Z","timestamp":1659963798000},"page":"895-912","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Efficacy and Real-Time Performance of Refraction Networking"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Stephens","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Hammoudeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,9]]},"reference":[{"key":"67_CR1","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.future.2019.11.012","volume":"111","author":"S Belguith","year":"2020","unstructured":"S. Belguith, N. Kaaniche, M. Hammoudeh, T. Dargahi, Proud: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Futur. Gener. Comput. Syst. 111, 899\u2013918 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"67_CR2","volume-title":"Free and Open Communications on the Internet","author":"B Birtel","year":"2020","unstructured":"B. Birtel, C. Rossow, Slitheen++: stealth TLS-based decoy routing, in Free and Open Communications on the Internet, (USENIX, 2020). https:\/\/www.usenix.org\/system\/files\/foci20-paper-birtel_0.pdf"},{"key":"67_CR3","volume-title":"Computer and Communications Security","author":"C Bocovich","year":"2016","unstructured":"C. Bocovich, I. Goldberg, Slitheen: perfectly imitated decoy routing through traffic replacement, in Computer and Communications Security, (ACM, 2016). https:\/\/www.cypherpunks.ca\/\u0303iang\/pubs\/slitheen-ccs16.pdf"},{"key":"67_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1515\/popets-2018-0020","volume":"3","author":"C Bocovich","year":"2018","unstructured":"C. Bocovich, I. Goldberg, Secure asymmetry and deployability for decoy routing systems. Priv. Enhancing Technol. 3, 43\u201362 (2018). https:\/\/www.petsymposium.org\/2018\/files\/papers\/issue3\/popets-2018-0020.pdf","journal-title":"Priv. Enhancing Technol."},{"key":"67_CR5","unstructured":"J. Cesareo, J. Karlin, J. Rexford, M. Schapira, Optimizing the placement of implicit proxies. Technical report, Deptment of Computer Science, Princeton University (2012). http:\/\/www.cs.princeton.edu\/\u0303jrex\/papers\/decoy-routing.pdf"},{"key":"67_CR6","volume-title":"Local Computer Networks","author":"D Ellard","year":"2015","unstructured":"D. Ellard, A. Jackson, C. Jones, V.U. Manfredi, T. Strayer, B. Thapa, M.V. Welie, Rebound: decoy routing on asymmetric routes via error messages, in Local Computer Networks, (IEEE, 2015). https:\/\/www.victoriamanfredi.com\/publications\/lcn15.pdf"},{"key":"67_CR7","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1145\/2815675.2815690","volume-title":"Proceedings of the 2015 Internet Measurement Conference, Association for Computing Machinery, New York, NY, USA, IMC \u201815","author":"R Ensafi","year":"2015","unstructured":"R. Ensafi, D. Fifield, P. Winter, N. Feamster, N. Weaver, V. Paxson, Examining how the great firewall discovers hidden circumvention servers, in Proceedings of the 2015 Internet Measurement Conference, Association for Computing Machinery, New York, NY, USA, IMC \u201815, (2015), pp. 445\u2013458. https:\/\/doi.org\/10.1145\/2815675.2815690"},{"key":"67_CR8","volume-title":"Free and Open Communications on the Internet","author":"S Frolov","year":"2017","unstructured":"S. Frolov, F. Douglas, W. Scott, A. McDonald, B. VanderSloot, R. Hynes, A. Kruger, M. Kallitsis, D.G. Robinson, S. Schultze, N. Borisov, J.A. Halderman, E. Wustrow, An ISP-scale deployment of TapDance, in Free and Open Communications on the Internet, (USENIX, 2017). https:\/\/www.usenix.org\/system\/files\/conference\/foci17\/foci17-paper-frolov_0.pdf"},{"key":"67_CR9","volume-title":"Computer and Communications Security","author":"S Frolov","year":"2019","unstructured":"S. Frolov, J. Wampler, S.C. Tan, J.A. Halderman, N. Borisov, E. Wustrow, Conjure: summoning proxies from unused address space, in Computer and Communications Security, (ACM, 2019). https:\/\/jhalderm.com\/pub\/papers\/conjure-ccs19.pdf"},{"key":"67_CR10","volume-title":"Proceedings of the International Conference on Future Networks and Distributed Systems","author":"I Ghafir","year":"2017","unstructured":"I. Ghafir, V. Prenosil, M. Hammoudeh, L. Han, U. Raza, Malicious SSL certificate detection: a step towards advanced persistent threat defence, in Proceedings of the International Conference on Future Networks and Distributed Systems, (2017)"},{"key":"67_CR11","doi-asserted-by":"publisher","first-page":"38947","DOI":"10.1109\/ACCESS.2018.2846740","volume":"6","author":"I Ghafir","year":"2018","unstructured":"I. Ghafir, V. Prenosil, M. Hammoudeh, T. Baker, S. Jabbar, S. Khalid, S. Jaf, Botdet: a system for real time botnet command and control traffic detection. IEEE Access 6, 38947\u201338958 (2018)","journal-title":"IEEE Access"},{"key":"67_CR12","first-page":"187","volume-title":"Computer and Communications Security","author":"A Houmansadr","year":"2011","unstructured":"A. Houmansadr, G.T.K. Nguyen, M. Caesar, N. Borisov, Cirripede: circumvention infrastructure using router redirection with plausible deniability, in Computer and Communications Security, (ACM, 2011), pp. 187\u2013200. https:\/\/hatswitch.org\/~nikita\/papers\/cirripede-ccs11.pdf"},{"key":"67_CR13","volume-title":"Proceedings of the Network and Distributed Security Symposium \u2013 NDSS \u201814, Internet Society","author":"A Houmansadr","year":"2014","unstructured":"A. Houmansadr, E.L. Wong, V. Shmatikov, No direction home: the true cost of routing around decoys, in Proceedings of the Network and Distributed Security Symposium \u2013 NDSS \u201814, Internet Society, (2014)"},{"key":"67_CR14","unstructured":"F. House, Freedom on the net 2020: the pandemic\u2019s digital shadow (2020). https:\/\/freedomhouse.org\/sites\/default\/files\/2020-10\/10122020_FOTN2020_Complete_Report_FINAL.pdf"},{"key":"67_CR15","doi-asserted-by":"crossref","unstructured":"W. John, M. Dusi, K. Claffy, Estimating routing symmetry on single links by passive flow measurements in Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, Association for Computing Machinery, New York, NY, USA, IWCMC \u201910, (2010), pp. 473\u2013478. https:\/\/doi.org\/10.1145\/1815396.1815506","DOI":"10.1145\/1815396.1815506"},{"key":"67_CR16","volume-title":"Free and Open Communications on the Internet","author":"J Karlin","year":"2011","unstructured":"J. Karlin, D. Ellard, A.W. Jackson, C.E. Jones, G. Lauer, D.P. Mankins, W.T. Strayer, Decoy routing: toward unblockable Internet communication, in Free and Open Communications on the Internet, (USENIX, 2011). https:\/\/www.usenix.org\/legacy\/events\/foci11\/tech\/final_files\/Karlin.pdf"},{"key":"67_CR17","unstructured":"B. Leidl, Obfuscated openssh (2010). https:\/\/github.com\/brl\/obfuscated-openssh"},{"key":"67_CR18","volume-title":"Free and open communications on the Internet","author":"V Manfredi","year":"2018","unstructured":"V. Manfredi, P. Songkuntham, MultiFlow: cross-connection decoy routing using TLS 1.3 session resumption, in Free and open communications on the Internet, (USENIX, 2018). https:\/\/www.usenix.org\/system\/files\/conference\/foci18\/foci18-paper-manfredi.pdf"},{"key":"67_CR19","volume-title":"Computer and Communications Security","author":"M Nasr","year":"2017","unstructured":"M. Nasr, H. Zolfaghari, A. Houmansadr, The waterfall of liberty: decoy routing circumvention that resists routing attacks, in Computer and Communications Security, (ACM, 2017). https:\/\/acmccs.github.io\/papers\/p2037-nasrA.pdf"},{"key":"67_CR20","unstructured":"Psiphon, Psiphon: uncensored internet access for windows and mobile (2020). https:\/\/psiphon3.com"},{"key":"67_CR21","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-319-58424-9_35","volume-title":"Computer and Network Security Essentials","author":"J Saleem","year":"2018","unstructured":"J. Saleem, M. Hammoudeh, Defense methods against social engineering attacks, in Computer and Network Security Essentials, (Springer, 2018), pp. 603\u2013618"},{"key":"67_CR22","volume-title":"Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)","author":"M Schuchard","year":"2012","unstructured":"M. Schuchard, J. Geddes, C. Thompson, N. Hopper, Routing around decoys, in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), (2012)"},{"key":"67_CR23","doi-asserted-by":"crossref","unstructured":"P.K. Sharma, D. Gosain, H. Sagar, C. Kumar, A. Dogra, V. Naik, H.B. Acharya, S. Chakravarty, SiegeBreaker: an SDN based practical decoy routing system. Priv. Enhancing Technol. (3), 243\u2013263 (2020). https:\/\/petsymposium.org\/2020\/files\/papers\/issue3\/popets-2020-0051.pdf","DOI":"10.2478\/popets-2020-0051"},{"key":"67_CR24","doi-asserted-by":"crossref","unstructured":"B. VanderSloot, S. Frolov, J. Wampler, S.C. Tan, I. Simpson, M. Kallitsis, J.A. Halderman, N. Borisov, E. Wustrow, Running refraction networking for real. Proc. Priv. Enhancing Technol. (4), 321\u2013335 (2020a)","DOI":"10.2478\/popets-2020-0075"},{"key":"67_CR25","doi-asserted-by":"crossref","unstructured":"B. VanderSloot, S. Frolov, J. Wampler, S.C. Tan, I. Simpson, M. Kallitsis, J.A. Halderman, N. Borisov, E. Wustrow, Running refraction networking for real. Priv. Enhancing Technol. (3), 321\u2013335 (2020b). https:\/\/petsymposium.org\/2020\/files\/papers\/issue4\/popets-2020-0073.pdf","DOI":"10.2478\/popets-2020-0075"},{"issue":"4","key":"67_CR26","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1007\/s11227-019-03028-9","volume":"76","author":"S Walker-Roberts","year":"2020","unstructured":"S. Walker-Roberts, M. Hammoudeh, O. Aldabbas, M. Aydin, A. Dehghantanha, Threats on the horizon: understanding security threats in the era of cyber-physical systems. J. Supercomput. 76(4), 2643\u20132664 (2020)","journal-title":"J. Supercomput."},{"key":"67_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101988","volume":"95","author":"M Walshe","year":"2019","unstructured":"M. Walshe, G. Epiphaniou, H. Al-Khateeb, M. Hammoudeh, V. Katos, A. Dehghantanha, Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Netw. 95, 101988 (2019)","journal-title":"Ad Hoc Netw."},{"key":"67_CR28","volume-title":"USENIX Security Symposium","author":"E Wustrow","year":"2011","unstructured":"E. Wustrow, S. Wolchok, I. Goldberg, J.A. Halderman, Telex: anticensorship in the network infrastructure, in USENIX Security Symposium, (USENIX, 2011). https:\/\/www.usenix.org\/event\/sec11\/tech\/full_papers\/Wustrow.pdf"},{"key":"67_CR29","volume-title":"Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)","author":"E Wustrow","year":"2014","unstructured":"E. Wustrow, C.M. Swanson, J.A. Halderman, Tapdance: end-to-middle anticensorship without flow blocking, in Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), (USENIX Association, San Diego, 2014)"}],"container-title":["Handbook of Real-Time Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-287-251-7_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T13:13:53Z","timestamp":1659964433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-287-251-7_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789812872500","9789812872517"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-287-251-7_67","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}