{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:22:58Z","timestamp":1772205778385,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T00:00:00Z","timestamp":1445990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ACI-1127506, CNS-1111449, ACI-1127506, CNS-1237265"],"award-info":[{"award-number":["ACI-1127506, CNS-1111449, ACI-1127506, CNS-1237265"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,28]]},"DOI":"10.1145\/2815675.2815700","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T12:37:04Z","timestamp":1445949424000},"page":"13-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Resilience of Deployed TCP to Blind Attacks"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Luckie","sequence":"first","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]},{"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School, Monterey, CA, USA"}]},{"given":"Tiange","family":"Wu","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"given":"Mark","family":"Allman","sequence":"additional","affiliation":[{"name":"ICSI, Berkeley, CA, USA"}]},{"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FreeBSD-SA-14:19.tcp: Denial of service in TCP packet processing. https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-14:19.tcp.asc.  FreeBSD-SA-14:19.tcp: Denial of service in TCP packet processing. https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-14:19.tcp.asc."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. Top 1 000 000 sites. http:\/\/www.alexa.com\/topsites.  Alexa. Top 1 000 000 sites. http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517483"},{"key":"e_1_3_2_1_4_1","volume-title":"Ingress filtering for multihomed networks. RFC","author":"Baker F.","year":"2004","unstructured":"F. Baker and P. Savola . Ingress filtering for multihomed networks. RFC 3704, Mar. 2004 . F. Baker and P. Savola. Ingress filtering for multihomed networks. RFC 3704, Mar. 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068833"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1948"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"e_1_3_2_1_8_1","volume-title":"TCP Vulnerabilities in Multiple IOS-Based Cisco Products","year":"2004","unstructured":"Cisco. TCP Vulnerabilities in Multiple IOS-Based Cisco Products , 2004 . http:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20040420-tcp-ios. Cisco. TCP Vulnerabilities in Multiple IOS-Based Cisco Products, 2004. http:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20040420-tcp-ios."},{"key":"e_1_3_2_1_9_1","volume-title":"Blackhat","author":"Convery S.","year":"2003","unstructured":"S. Convery and M. Franz . BGP vulnerability testing: separating fact from FUD . In Blackhat , 2003 . S. Convery and M. Franz. BGP vulnerability testing: separating fact from FUD. In Blackhat, 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"Internet assigned numbers authority (IANA) procedures for the management of the service name and transport protocol port number registry. RFC","author":"Cotton M.","year":"2011","unstructured":"M. Cotton , L. Eggert , J. Touch , M. Westerlund , and S. Cheshire . Internet assigned numbers authority (IANA) procedures for the management of the service name and transport protocol port number registry. RFC 6335, Aug. 2011 . M. Cotton, L. Eggert, J. Touch, M. Westerlund, and S. Cheshire. Internet assigned numbers authority (IANA) procedures for the management of the service name and transport protocol port number registry. RFC 6335, Aug. 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626321"},{"key":"e_1_3_2_1_12_1","volume-title":"Feb.","author":"Durand J.","year":"2015","unstructured":"J. Durand , I. Pepelnjak , and G. Doering . BGP Operations and Security. RFC 7454 (Best Current Practice) , Feb. 2015 . J. Durand, I. Pepelnjak, and G. Doering. BGP Operations and Security. RFC 7454 (Best Current Practice), Feb. 2015."},{"key":"e_1_3_2_1_13_1","volume-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC","author":"Ferguson P.","year":"2000","unstructured":"P. Ferguson and D. Senie . Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827, May 2000 . P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827, May 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597173"},{"key":"e_1_3_2_1_15_1","volume-title":"The generalized TTL security mechanism (GTSM). RFC","author":"Gill V.","year":"2007","unstructured":"V. Gill , J. Heasley , D. Meyer , and P. Savola . The generalized TTL security mechanism (GTSM). RFC 5082, Oct. 2007 . V. Gill, J. Heasley, D. Meyer, and P. Savola. The generalized TTL security mechanism (GTSM). RFC 5082, Oct. 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"A. Heffernan. Protection of BGP sessions via the TCP MD5 signature option. RFC 2385 Aug. 1998.   A. Heffernan. Protection of BGP sessions via the TCP MD5 signature option. RFC 2385 Aug. 1998.","DOI":"10.17487\/rfc2385"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535830"},{"key":"e_1_3_2_1_18_1","volume-title":"claffy. Archipelago measurement infrastructure","author":"Hyun Y.","year":"2015","unstructured":"Y. Hyun and k. claffy. Archipelago measurement infrastructure , 2015 . http:\/\/www.caida.org\/projects\/ark\/. Y. Hyun and k. claffy. Archipelago measurement infrastructure, 2015. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Internet Assigned Numbers Authority (IANA). Service name and transport protocol port number registry. http:\/\/www.iana.org\/assignments\/port-numbers.  Internet Assigned Numbers Authority (IANA). Service name and transport protocol port number registry. http:\/\/www.iana.org\/assignments\/port-numbers."},{"key":"e_1_3_2_1_20_1","volume-title":"TCP Extensions for High Performance. RFC","author":"Jacobson V.","year":"2014","unstructured":"V. Jacobson , R. Braden , D. Borman , and R. Scheffenegger . TCP Extensions for High Performance. RFC 7323, Sept. 2014 . V. Jacobson, R. Braden, D. Borman, and R. Scheffenegger. TCP Extensions for High Performance. RFC 7323, Sept. 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Black Hat USA","author":"Kaminsky D.","year":"2008","unstructured":"D. Kaminsky . Black Ops 2008: It's the end of the cache as we know it . Black Hat USA , 2008 . D. Kaminsky. Black Ops 2008: It's the end of the cache as we know it. Black Hat USA, 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"IP authentication header. RFC","author":"Kent S.","year":"2005","unstructured":"S. Kent . IP authentication header. RFC 4302, Dec. 2005 . S. Kent. IP authentication header. RFC 4302, Dec. 2005."},{"key":"e_1_3_2_1_23_1","volume-title":"Recommendations for transport-protocol port randomization. RFC","author":"Larsen M.","year":"2011","unstructured":"M. Larsen and F. Gont . Recommendations for transport-protocol port randomization. RFC 6056, Jan. 2011 . M. Larsen and F. Gont. Recommendations for transport-protocol port randomization. RFC 6056, Jan. 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879171"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879155"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2018"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028835"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064418"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383083"},{"key":"e_1_3_2_1_30_1","volume-title":"Transmission control protocol. RFC","author":"Postel J.","year":"1981","unstructured":"J. Postel . Transmission control protocol. RFC 791, Sept. 1981 . J. Postel. Transmission control protocol. RFC 791, Sept. 1981."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"e_1_3_2_1_32_1","volume-title":"Improving TCP's robustness to blind in-window attacks. RFC","author":"Ramaiah A.","year":"2010","unstructured":"A. Ramaiah , R. Stewart , and M. Dalal . Improving TCP's robustness to blind in-window attacks. RFC 5961, Aug. 2010 . A. Ramaiah, R. Stewart, and M. Dalal. Improving TCP's robustness to blind in-window attacks. RFC 5961, Aug. 2010."},{"key":"e_1_3_2_1_33_1","volume-title":"Jan.","author":"Rekhter Y.","year":"2006","unstructured":"Y. Rekhter , T. Li , and S. Hares . A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard) , Jan. 2006 . Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard), Jan. 2006."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656881"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285292"},{"key":"e_1_3_2_1_36_1","volume-title":"Defending TCP against spoofing attacks. RFC","author":"Touch J.","year":"2007","unstructured":"J. Touch . Defending TCP against spoofing attacks. RFC 4953, July 2007 . J. Touch. Defending TCP against spoofing attacks. RFC 4953, July 2007."},{"key":"e_1_3_2_1_37_1","volume-title":"The TCP authentication option. RFC","author":"Touch J.","year":"2010","unstructured":"J. Touch , A. Mankin , and R. Bonica . The TCP authentication option. RFC 5925, June 2010 . J. Touch, A. Mankin, and R. Bonica. The TCP authentication option. RFC 5925, June 2010."},{"key":"e_1_3_2_1_38_1","volume-title":"Apr.","author":"Watson P.","year":"2004","unstructured":"P. Watson . Slipping in the window: TCP reset attacks , Apr. 2004 . P. Watson. Slipping in the window: TCP reset attacks, Apr. 2004."},{"key":"e_1_3_2_1_39_1","unstructured":"M. Zalewski. p0f v3 (version 3.08b). http:\/\/lcamtuf.coredump.cx\/p0f3\/.  M. Zalewski. p0f v3 (version 3.08b). http:\/\/lcamtuf.coredump.cx\/p0f3\/."},{"key":"e_1_3_2_1_40_1","unstructured":"M. Zalewski. Strange attractors and TCP\/IP sequence number analysis 2002.  M. Zalewski. Strange attractors and TCP\/IP sequence number analysis 2002."}],"event":{"name":"IMC '15: Internet Measurement Conference","location":"Tokyo Japan","acronym":"IMC '15","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2015 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815675.2815700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,28]]},"references-count":40,"alternative-id":["10.1145\/2815675.2815700","10.1145\/2815675"],"URL":"https:\/\/doi.org\/10.1145\/2815675.2815700","relation":{},"subject":[],"published":{"date-parts":[[2015,10,28]]},"assertion":[{"value":"2015-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}