{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:07:26Z","timestamp":1730225246372,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/hpcsim.2011.5999864","type":"proceedings-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T19:18:55Z","timestamp":1314818335000},"page":"485-490","source":"Crossref","is-referenced-by-count":1,"title":["Matryoshka: Tunneled packets breaking the rules"],"prefix":"10.1109","author":[{"given":"Cesar","family":"Ghali","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Hamady","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"Simple and Flexible Datagram Access Controls for Unixbased Gateways","year":"1989","author":"mogul","key":"22"},{"key":"17","article-title":"Layer two tunneling protocol (L2TP)","author":"townsley","year":"1999","journal-title":"RFC 2661"},{"journal-title":"Packet Fragmentation Versus the Intrusion Detection System (IDS)","year":"2007","author":"parker","key":"23"},{"year":"0","key":"18"},{"key":"15","article-title":"Security architecture for the internet protocol","author":"kent","year":"1998","journal-title":"RFC 2401"},{"key":"16","article-title":"The TLS protocol version 1.0","author":"dierks","year":"1999","journal-title":"RFC 2246"},{"journal-title":"Flow Characterization for Intrusion Detection","year":"2000","author":"dunigan","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/948143.948144"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0030-0"},{"key":"21","article-title":"A tunnelaware language for network packet filtering","author":"ciminiera","year":"2010","journal-title":"Global Communication Conference"},{"year":"0","key":"3"},{"journal-title":"Security Concerns with IP Tunneling","year":"2010","author":"hoagland","key":"20"},{"year":"0","key":"2"},{"journal-title":"Intrusion Detection FAQ What Are the Top Selling IDS\/IPS and What Differentiates them from Each Other?","year":"2009","author":"kibirkstis","key":"1"},{"journal-title":"Network Intrusion Detection Signatures Part Three","year":"2002","author":"frederick","key":"10"},{"key":"7","article-title":"Connection of IPv6 domains via IPv4 clouds","author":"carpenter","year":"2001","journal-title":"RFC 3056"},{"key":"6","article-title":"Generic routing encapsulation","author":"farinacci","year":"2000","journal-title":"RFC 2784"},{"key":"5","article-title":"IP in IP tunneling","author":"simpson","year":"1995","journal-title":"RFC 1853"},{"key":"4","first-page":"229238","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration"},{"key":"9","first-page":"94","article-title":"Guide to intrusion detection and prevention systems (idps)","volume":"800","author":"scarfone","year":"2007","journal-title":"NIST Special Publication"},{"journal-title":"The Evolution of IDS From Academia to Commercial Necessity","year":"0","author":"dearment","key":"8"}],"event":{"name":"Simulation (HPCS)","start":{"date-parts":[[2011,7,4]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2011,7,8]]}},"container-title":["2011 International Conference on High Performance Computing &amp; Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5979720\/5999789\/05999864.pdf?arnumber=5999864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:16:23Z","timestamp":1490091383000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5999864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2011.5999864","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}