{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:42:08Z","timestamp":1730194928153,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035323","type":"proceedings-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T23:08:51Z","timestamp":1584400131000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack"],"prefix":"10.1109","author":[{"given":"Zouheir","family":"Trabelsi","sequence":"first","affiliation":[]},{"given":"Safaa","family":"Zeidan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.cose.2015.05.010"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ICC.2012.6364218"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.cose.2013.07.001"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1049\/iet-ifs.2011.0146"},{"year":"0","journal-title":"Commview Tools","key":"ref37"},{"year":"0","journal-title":"LiteServe Software","key":"ref36"},{"year":"0","journal-title":"Hping3 Tool","key":"ref35"},{"year":"0","journal-title":"Frameip Packet Generator Tool","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/INFOCOM.2006.129"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/INFCOM.2007.106"},{"key":"ref12","first-page":"1","article-title":"Adaptive early packet filtering for defending firewalls against DoS Attack","author":"al-shaer","year":"0","journal-title":"Proc IEEE InfoCom"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TrustCom.2014.20"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TCC.2016.2554548"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICC.2012.6364218"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.cose.2015.05.010"},{"key":"ref17","article-title":"Maximising firewall availability","author":"gill","year":"2009","journal-title":"Retrieved"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ACCESS.2018.2850345"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICC.2018.8422079"},{"year":"0","journal-title":"Iptables Difference Between NEW ESTABLISHED and RELATED Packets","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s13369-016-2359-0"},{"year":"0","journal-title":"[ScreenOS] How to determine the timeout of a session and how do they work","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1002\/sec.118"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICCET.2009.62"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TNSM.2011.122011.110151"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ISDPE.2007.40"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.cose.2013.07.001"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1049\/iet-ifs.2011.0146"},{"key":"ref2","first-page":"46","article-title":"Network Security in Digitalization: Attacks and Defence","volume":"5","author":"prabhakar","year":"2017","journal-title":"Int Journal of Robotics Research and Applications"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/JSAC.2006.877140"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1109\/TIFS.2017.2668602","article-title":"Firewall Fingerprinting and Denial of Firewalling Attacks","volume":"12","author":"alex","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref20","article-title":"The BlackNurse Attack","author":"hansson","year":"2016","journal-title":"TDC Security Operation Center"},{"year":"2011","author":"fall","journal-title":"TCP\/IP Illustrated Volume 1 The Protocols","key":"ref22"},{"year":"2016","author":"khandelwal","journal-title":"Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack","key":"ref21"},{"year":"0","author":"wool","journal-title":"Stateful Packet-Filtering Firewall","key":"ref24"},{"year":"2005","author":"zeltser","journal-title":"Inside 1160 network perimeter security Stateful firewalls","key":"ref23"},{"year":"0","journal-title":"Connection Settings","key":"ref26"},{"year":"2016","author":"hank","journal-title":"Stateful Firewalls","key":"ref25"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2019,11,3]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035323.pdf?arnumber=9035323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:47:58Z","timestamp":1658141278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035323","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}