{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:22:35Z","timestamp":1763389355096,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cns48642.2020.9162332","type":"proceedings-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T21:54:40Z","timestamp":1596837280000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools"],"prefix":"10.1109","author":[{"given":"Jan","family":"Grashofer","sequence":"first","affiliation":[]},{"given":"Christian","family":"Titze","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991100"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.31"},{"key":"ref10","article-title":"Dynamic application-layer protocol analysis for network intrusion detection","author":"dreger","year":"2006","journal-title":"15th USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"journal-title":"Attacking network protocols a hacker&#x2019;s guide to capture analysis and exploitation","year":"2017","author":"forshaw","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7540"},{"journal-title":"The bro\/zeek network security monitor","year":"2019","key":"ref15"},{"year":"2019","key":"ref16"},{"journal-title":"Snort Users Manual","year":"2019","author":"roesch","key":"ref17"},{"journal-title":"Snort blog","year":"2018","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7231"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1958"},{"key":"ref4","article-title":"Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics","author":"kreibich","year":"2001","journal-title":"Proc Usenix Security Symposium"},{"key":"ref27","article-title":"The halting problems of network stack insecurity","volume":"36","author":"sassaman","year":"2011","journal-title":"login"},{"key":"ref3","article-title":"Insertion, evasion, and denial of service: Eluding network intrusion detection","author":"ptacek","year":"1998","journal-title":"Secure Networks Inc"},{"key":"ref6","article-title":"HTTP IDS evasions revisited","author":"roelker","year":"2003","journal-title":"SourceFire Inc"},{"key":"ref29","article-title":"The harmful consequences of the robustness principle","author":"thomson","year":"2019","journal-title":"Internet-draft"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092311.00082"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196528"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7230"},{"journal-title":"Bro release notes","year":"2019","key":"ref22"},{"journal-title":"Bro\/zeek documentation","year":"2019","key":"ref21"},{"journal-title":"Open Web Application Security Project (Owasp)","year":"2016","key":"ref24"},{"journal-title":"Open Information Security Foundation (OISF) Suricata","year":"2019","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"journal-title":"Web Server Survey","year":"2019","key":"ref25"}],"event":{"name":"2020 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2020,6,29]]},"location":"Avignon, France","end":{"date-parts":[[2020,7,1]]}},"container-title":["2020 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162332.pdf?arnumber=9162332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:58:43Z","timestamp":1656345523000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cns48642.2020.9162332","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}