{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:50Z","timestamp":1750307570299,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1741982","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"345-350","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Protocol scrubbing"],"prefix":"10.1145","author":[{"given":"S. N.","family":"Gujar","sequence":"first","affiliation":[{"name":"University of Pune, India"}]},{"given":"S. R.","family":"Gupta","sequence":"additional","affiliation":[{"name":"Prof. Ram Meghe Institute of Technology &amp; Research, Badnera(C. Rly), India"}]},{"given":"M. S.","family":"Ali","sequence":"additional","affiliation":[{"name":"Prof. Ram Meghe Institute of Technology &amp; Research, Badnera(C. Rly), India"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Building Internet Firewalls. O'Reily and Associates","author":"Chapman D. B.","year":"1995","unstructured":"D. B. Chapman and E. D. Zwicky . Building Internet Firewalls. O'Reily and Associates , Inc ., 1995 D. B. Chapman and E. D. Zwicky. Building Internet Firewalls. O'Reily and Associates, Inc., 1995"},{"key":"e_1_3_2_1_2_1","unstructured":"FreeBSD Homepage. http:\/\/freebsd.org.  FreeBSD Homepage. http:\/\/freebsd.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Fyodor. Remote OS detection via TCP\/IP stack fingerprinting. http:\/\/www.insecure.org\/nmap\/namp-fingerprinting-article.html October 1998.  Fyodor. Remote OS detection via TCP\/IP stack fingerprinting. http:\/\/www.insecure.org\/nmap\/namp-fingerprinting-article.html October 1998."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel Internet Exchange Architecture http:\/\/developer.intel.com\/design\/IXA\/.  Intel Internet Exchange Architecture http:\/\/developer.intel.com\/design\/IXA\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Transport and Application Protocol Scrubbing. In proceedings of the IEEE INFOCOMM 2000 Conference","author":"Malan G. R.","year":"2000","unstructured":"G. R. Malan , D. Watson , F. Jahanian , and P. Howell . Transport and Application Protocol Scrubbing. In proceedings of the IEEE INFOCOMM 2000 Conference , Tel Aviv, Israel , March 2000 . G. R. Malan, D. Watson, F. Jahanian, and P. Howell. Transport and Application Protocol Scrubbing. In proceedings of the IEEE INFOCOMM 2000 Conference, Tel Aviv, Israel, March 2000."},{"key":"e_1_3_2_1_7_1","unstructured":"R. McCabe. Iplog. http:\/\/onk.sourceforge.net\/  R. McCabe. Iplog. http:\/\/onk.sourceforge.net\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"e_1_3_2_1_9_1","unstructured":"Netperf: A Network Performance Benchmark. Http:\/\/www.netperf.org  Netperf: A Network Performance Benchmark. Http:\/\/www.netperf.org"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263160"},{"key":"e_1_3_2_1_11_1","volume-title":"Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium","author":"Paxson V.","year":"1998","unstructured":"V. Paxson , Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium , San Antonio, Texas , January 1998 . V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 1998."},{"volume-title":"Eluding Network Intrusion Detection. Originally Secure Networks","author":"Newsham T. H.","key":"e_1_3_2_1_12_1","unstructured":"T. H. Ptacek kand T. N. Newsham . Insertion, Evasion, and Denial of Service : Eluding Network Intrusion Detection. Originally Secure Networks , Inc ., now available as a white paper at the Network Associates Inc., http:\/\/www.nai.com\/, January 1998. T. H. Ptacek kand T. N. Newsham. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Originally Secure Networks, Inc., now available as a white paper at the Network Associates Inc., http:\/\/www.nai.com\/, January 1998."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.825654"},{"key":"e_1_3_2_1_14_1","unstructured":"Queso Homepage. http:\/\/www.apostols.org\/projectz\/queso\/-.  Queso Homepage. http:\/\/www.apostols.org\/projectz\/queso\/-."},{"key":"e_1_3_2_1_15_1","volume-title":"Intrusion Detection: Challenges and Myths. Network Flight Recorder","author":"Ranum M. J.","year":"1998","unstructured":"M. J. Ranum . Intrusion Detection: Challenges and Myths. Network Flight Recorder , Inc . whitepaper at http:\/\/www.nfr.com\/, 1998 . M. J. Ranum. Intrusion Detection: Challenges and Myths. Network Flight Recorder, Inc. whitepaper at http:\/\/www.nfr.com\/, 1998."},{"key":"e_1_3_2_1_16_1","unstructured":"M. J. Ranum K. Landfield M. Stolarchuk M. Sienkiewicz A. Lambeth and E. Wall. Implementing a Generalized Tool for Network Monitoring.  M. J. Ranum K. Landfield M. Stolarchuk M. Sienkiewicz A. Lambeth and E. Wall. Implementing a Generalized Tool for Network Monitoring."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"key":"e_1_3_2_1_18_1","unstructured":"I. S. Services. RealSecure__. http:\/\/www.iss.net\/prod\/rs.html.  I. S. Services. RealSecure__. http:\/\/www.iss.net\/prod\/rs.html."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of 9th USENIX Security Symposium","author":"Smart M.","year":"2000","unstructured":"M. Smart , G. R. Malan , and F. Jahanian . Defeating TCP\/IP Stack Fingerprinting . In Proceedings of 9th USENIX Security Symposium , Denver, Colorado , August 2000 . M. Smart, G. R. Malan, and F. Jahanian. Defeating TCP\/IP Stack Fingerprinting. In Proceedings of 9th USENIX Security Symposium, Denver, Colorado, August 2000."},{"key":"e_1_3_2_1_21_1","volume-title":"Volume 1: The Protocols","author":"Stevens W. R.","year":"1994","unstructured":"W. R. Stevens . TCP\/ IP Illustrated , Volume 1: The Protocols . Addison-Wesley , 1994 . W. R. Stevens. TCP\/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994."},{"key":"e_1_3_2_1_22_1","unstructured":"T. I. Systems. TIS Firewall Toolkit. ftp:\/\/ftp.tis.com\/pub\/firewalls\/toolkt.  T. I. Systems. TIS Firewall Toolkit. ftp:\/\/ftp.tis.com\/pub\/firewalls\/toolkt."},{"key":"e_1_3_2_1_23_1","unstructured":"C. P. S. Technologies. FireWall-1. http:\/\/www.checkpoint.com.  C. P. S. Technologies. FireWall-1. http:\/\/www.checkpoint.com."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.484228"},{"key":"e_1_3_2_1_25_1","volume-title":"TCP\/IP Illustrated, Volume 2: The Implementation","author":"Wright G. R.","year":"1995","unstructured":"G. R. Wright and W. R. Stevens . TCP\/IP Illustrated, Volume 2: The Implementation . Addison-Wesley , 1995 . G. R. Wright and W. R. Stevens. TCP\/IP Illustrated, Volume 2: The Implementation. Addison-Wesley, 1995."}],"event":{"name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Mumbai Maharashtra India","acronym":"ICWET '10"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1741982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:00Z","timestamp":1750250460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741982"}},"subtitle":["network security through transparent flow modification using active real time database"],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":23,"alternative-id":["10.1145\/1741906.1741982","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1741982","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}