{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:39:53Z","timestamp":1761932393567,"version":"build-2065373602"},"reference-count":33,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194882","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"164-175","source":"Crossref","is-referenced-by-count":39,"title":["Detecting spoofed packets"],"prefix":"10.1109","author":[{"given":"S.J.","family":"Templeton","sequence":"first","affiliation":[]},{"given":"K.E.","family":"Levitt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Practical Automated Detection of Stealthy Portscans","author":"staniford","year":"0","journal-title":"Journal of Computer Security"},{"article-title":"Strange Attractors and TCP\/IP Sequence Number Analysis","year":"2001","author":"zalewski","key":"ref32"},{"key":"ref31","article-title":"JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol","author":"wu","year":"1999","journal-title":"Journal of Computer Networks and ISDN Systems"},{"article-title":"An Introduction to ARP Spoofing","year":"2001","author":"whalen","key":"ref30"},{"year":"1995","key":"ref10","article-title":"Advisory Notice F-08 Internet Spoofing and Hijacked Session Attacks"},{"year":"1999","key":"ref11","article-title":"CERT Coordination Center. Spoofed\/Forged Email"},{"key":"ref12","first-page":"48","article-title":"IP Spoofing Demystified. Phrack Magazine Review","volume":"7","year":"1996"},{"article-title":"Nessus Security Scanner","year":"1998","author":"deraison","key":"ref13"},{"journal-title":"RFC 2131 Dynamic Host Configuration Protocol","year":"1997","author":"droms","key":"ref14"},{"article-title":"Backtracking spoofed packets","year":"2000","author":"dunigan","key":"ref15"},{"key":"ref16","first-page":"371","article-title":"Attack Class: Address Spoofing","author":"heberlein","year":"1996","journal-title":"Proc of the 19th National Information Systems Security Conference"},{"key":"ref17","article-title":"A Simple Active Attack Against TCP","author":"joncheray","year":"1995","journal-title":"The Fifth USENIX Unix Security Symp"},{"key":"ref18","article-title":"Security architecture for the Internet protocol","author":"kent","year":"1998","journal-title":"Internet Engineering Task Force RFC 2401"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"ref4","first-page":"199","article-title":"Using the Domain Name System for System Break-ins","author":"bellovin","year":"1995","journal-title":"Proc 5th UNIX Security Symposium"},{"key":"ref27","article-title":"Infrastructure for Intrusion Detection and Response","author":"schnackenberg","year":"2000","journal-title":"Proc DARPA Information Survivability Conf Exposition (DISCEX)"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0028465","article-title":"Stateless connections","author":"aura","year":"1997","journal-title":"Proc International Conference on Information and Communications Security (ICICS '97)"},{"article-title":"RFC 1948: Defending Against Sequence Number Attacks","year":"1996","author":"bellovin","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366187"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"journal-title":"Computer Emergency Response Team","article-title":"Smurf IP denial-of-service attacks. CERT Advisory CA-1998&#x2013;01","year":"1998","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INM.1999.770717"},{"year":"0","key":"ref2","article-title":"Lawrence Berkely National Labs Network Research Group"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383776"},{"year":"2001","key":"ref1","article-title":"New tcp scan method. BugTraq"},{"journal-title":"L0pht Heavy Industries Antisniff Technical Documentation","year":"2000","key":"ref20"},{"journal-title":"RFC 791 DARPA Internet Program Protocol Specification","year":"1981","author":"postel","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/248156.248160","article-title":"End-to-end Routing Behavior in the Internet","author":"paxson","year":"1996","journal-title":"Proc SIGCOMM '96"},{"key":"ref24","article-title":"Practical network support for IP traceback","author":"savage","year":"2000","journal-title":"Proc of the 2000 ACM SIGCOMM Conference"},{"key":"ref23","article-title":"Transmission Control Protocol","author":"postel","year":"1981","journal-title":"RFC 793"},{"key":"ref26","article-title":"TCP\/IP Illustrated","volume":"i","author":"stevens","year":"1994","journal-title":"The Protocols"},{"key":"ref25","article-title":"Countering abuse of name-based authentication","author":"schuba","year":"1996","journal-title":"Proceedings of Annual Telecommunications Policy Research Conference"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194882.pdf?arnumber=1194882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,21]],"date-time":"2018-04-21T14:13:13Z","timestamp":1524319993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194882\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194882","relation":{},"subject":[]}}