{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:45:38Z","timestamp":1761709538732,"version":"3.37.3"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"DOCTOR Project"},{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-14-CE28-0001"],"award-info":[{"award-number":["ANR-14-CE28-0001"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP17H00734"],"award-info":[{"award-number":["JP17H00734"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2877792","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T18:59:21Z","timestamp":1540407561000},"page":"65151-65170","source":"Crossref","is-referenced-by-count":8,"title":["Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1482-6148","authenticated-orcid":false,"given":"Daishi","family":"Kondo","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Silverston","sequence":"additional","affiliation":[]},{"given":"Vassilis","family":"Vassiliades","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Tode","sequence":"additional","affiliation":[]},{"given":"Tohru","family":"Asami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"84","article-title":"A comparative performance evaluation of DNS tunneling tools","author":"merlo","year":"2011","journal-title":"Proc CISIS"},{"journal-title":"DNScat","year":"2018","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030389"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866434"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"journal-title":"Foundations of Statistical Natural Language Processing","year":"1999","author":"manning","key":"ref30"},{"key":"ref37","first-page":"1","article-title":"On the viability and performance of DNS tunneling","author":"leijenhorst","year":"2008","journal-title":"Proc ICIT"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/2984356.2984360","article-title":"A consumer-driven access control approach to censorship circumvention in content-centric networking","author":"kurihara","year":"2016","journal-title":"Proceedings of ACM ICN"},{"key":"ref35","first-page":"167","article-title":"Catch me if you can: A practical framework to evade censorship in information-centric networks","author":"tourani","year":"2015","journal-title":"Proceedings of ACM ICN"},{"key":"ref34","first-page":"1","article-title":"ANDaNA: Anonymous named data networking application","author":"dibenedetto","year":"2012","journal-title":"Proc NDSS"},{"journal-title":"Latest ITU-T Recommendation","year":"2016","key":"ref28"},{"key":"ref27","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"journal-title":"ndn-cxx","year":"2018","key":"ref29"},{"journal-title":"Understanding Targeted Attacks The Impact of Targeted Attacks","year":"2018","key":"ref2"},{"journal-title":"IT Security Risks Survey 2014","year":"2018","key":"ref1"},{"journal-title":"URL Fragments and Redirects","year":"2018","key":"ref20"},{"journal-title":"Google&#x2019;s Search Business Might not be as Water-Tight as People Think it is","year":"2018","key":"ref22"},{"journal-title":"Under The Ocean of the Internet - The Deep Web","year":"2018","author":"hawkins","key":"ref21"},{"journal-title":"15 SEO Best Practices for Structuring URLs","year":"2018","key":"ref24"},{"journal-title":"Search Engine Optimization Starter Guide","year":"2018","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"journal-title":"Uniform Resource Locators (URL)","year":"1994","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23014"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193505"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984373"},{"journal-title":"Uniform Resource Identifier (URI) Generic Syntax","year":"2005","key":"ref10"},{"journal-title":"NDN Technical Memo Naming Conventions","year":"2018","key":"ref11"},{"journal-title":"Detecting DNS Tunnels Using Character Frequency Analysis","year":"2010","author":"born","key":"ref40"},{"journal-title":"Relative Uniform Resource Locators","year":"1995","key":"ref12"},{"journal-title":"The official Google Blog we knew the web was big","year":"2018","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983087"},{"key":"ref15","first-page":"478","article-title":"A semantic firewall for content-centric networking","author":"goergen","year":"2013","journal-title":"Proc IFIP\/IEEE IM Mini-Conf"},{"journal-title":"NDN Packet Format Specification 0 2-2 Documentation","year":"2018","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874390"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653725"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0006206401570166"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116403"},{"journal-title":"Common crawl","year":"2016","key":"ref7"},{"key":"ref49","first-page":"1","article-title":"Interest flooding attack and countermeasures in named data networking","author":"afanasyev","year":"2013","journal-title":"Proc IFIP Netw"},{"journal-title":"NDN Packet Format Specification","year":"2018","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2836"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883426"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.10"},{"journal-title":"Morto Worm Sets A (DNS) Record","year":"2018","key":"ref47"},{"journal-title":"Detecting DNS Tunneling","year":"2018","author":"farnham","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.109"},{"journal-title":"Requirements for IP Flow Information Export (IPFIX)","year":"2004","key":"ref44"},{"key":"ref43","first-page":"124","article-title":"Flow-based detection of DNS tunnels","author":"ellens","year":"2013","journal-title":"Proc AIMS"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08506363.pdf?arnumber=8506363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T15:13:39Z","timestamp":1643296419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2877792","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}