{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:24:54Z","timestamp":1772112294089,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"value":"9781475744057","type":"print"},{"value":"9780387356129","type":"electronic"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-0-387-35612-9_6","type":"book-chapter","created":{"date-parts":[[2013,3,10]],"date-time":"2013-03-10T20:05:52Z","timestamp":1362945952000},"page":"57-77","source":"Crossref","is-referenced-by-count":21,"title":["Improving the Functionality of SYN Cookies"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"D. J. Bernstein. SYN cookies. \n                    http:\/\/www.cr.yp.to\n                    \n                  \/syncookies.html."},{"key":"6_CR2","unstructured":"Syn cookies mailing list syncookies-archive@koobera. math.uic.edu. \n                    http:\/\/www.cr.yp.to\n                    \n                  \/syncookies\/archive."},{"key":"6_CR3","series-title":"RFC 793, available via DDN Network Center","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793","volume-title":"Transmission Control Protocol","author":"J Postel","year":"1981","unstructured":"J. Postel. Transmission Control Protocol. RFC 793, September 1981. available via DDN Network Center."},{"key":"6_CR4","series-title":"RFC 1948, available via DDN Network Center","volume-title":"Defending Against Sequence Number Attacks","author":"S Bellovin","year":"1966","unstructured":"S. Bellovin. Defending Against Sequence Number Attacks. RFC 1948, May 1996. available via DDN Network Center."},{"key":"6_CR5","volume-title":"RFC 2267, available via DDN Network Center","author":"P Lincoln","year":"1999","unstructured":"P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2267, January 1998. available via DDN Network Center."},{"key":"6_CR6","volume-title":"Comm. Net. and Dist. Systems Modeling and Simulation Conf","author":"L Ricciulli","year":"1999","unstructured":"Livio Ricciulli, Patrick Lincoln, and Pankaj Kakkar. TCP SYN Flooding Defense. In Comm. Net. and Dist. Systems Modeling and Simulation Conf. (CNDS\u2019 99),, 1999 Western MultiConf. (WMC\u2019 99)\u201e San Francisco, CAL, USA, January 1999."},{"key":"6_CR7","unstructured":"Eric Schenk. Another new thought on TCP SYN attacks, 1996. \n                    http:\/\/www.wcug.wwu.edu\n                    \n                  \/lists\/netdev\/199609\/msg00115.html."},{"key":"6_CR8","series-title":"RFC 1072, available via DDN Network Center","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1072","volume-title":"TCP Extensions for Long-Delay Paths","author":"V Jacobson","year":"1988","unstructured":"V. Jacobson and R. Braden. TCP Extensions for Long-Delay Paths. RFC 1072, October 1988. available via DDN Network Center."},{"key":"6_CR9","volume-title":"RFC 1323, available via DDN Network Center","author":"V Jacobson","year":"1323","unstructured":"V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. RFC 1323, May 1992. available via DDN Network Center."},{"key":"6_CR10","volume-title":"RFC 1122, available via DDN Network Center","author":"R Braden","year":"1122","unstructured":"R. Braden. Requirements for Internet Hosts \u2014 Communication Layers. RFC 1122, October 1989. available via DDN Network Center."},{"key":"6_CR11","volume-title":"RFC, available via DDN Network Center","author":"Q Xie","year":"2960","unstructured":"Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream Control Transmission Protocol. RFC 2960, October 2000. available via DDN Network Center."},{"key":"6_CR12","volume-title":"Remote Os detection via TCP\/IP Stack FingerPrinting","author":"Fyodor","year":"1998","unstructured":"Fyodor. Remote OS detection via TCP\/IP Stack FingerPrinting, October 1998. \n                    http:\/\/www.insecure.org\n                    \n                  \/nmap\/nmap-fingerprinting-article.html."},{"key":"6_CR13","unstructured":"Burak Dayioglu and Attila \u00d6zgit. Use of Passive Network Mapping to Enhance Signature Quality of Misuse Network Intrusion Detection Systems. In 16th Int. Symp. on Computer and Information Sciences, November 2001."},{"key":"6_CR14","volume-title":"Know Your Enemy","author":"Honeynet Project","year":"2002","unstructured":"Honeynet Project. Know Your Enemy: Passive Fingerprinting. White Paper, January 2002.\n\n                    http:\/\/www.project.honeynet.org\n                    \n                  ."},{"key":"6_CR15","volume-title":"Proc. of the 9th USENIX Security Symp","author":"M Smart","year":"2000","unstructured":"Matthew Smart, G. Robert Malan, and Farnam Jahanian. Defeating TCP\/IP Stack Fingerprinting. In Proc. of the 9th USENIX Security Symp., 2000."}],"container-title":["IFIP Advances in Information and Communication Technology","Advanced Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35612-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T12:31:22Z","timestamp":1557577882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35612-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781475744057","9780387356129"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35612-9_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002]]}}}