{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:51Z","timestamp":1750220391516,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Tokyo University of Science","award":["DSIT 2021 - D060"],"award-info":[{"award-number":["DSIT 2021 - D060"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,23]]},"DOI":"10.1145\/3478905.3478950","type":"proceedings-article","created":{"date-parts":[[2021,9,28]],"date-time":"2021-09-28T15:56:17Z","timestamp":1632844577000},"page":"226-230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Vulnerability of Dynamic Network Address Translation to\u00a0Denial-of-Service\u00a0Attacks"],"prefix":"10.1145","author":[{"given":"Shigeo","family":"Akashi","sequence":"first","affiliation":[{"name":"Tokyo University of Science, Japan"}]},{"given":"Yao","family":"Tong","sequence":"additional","affiliation":[{"name":"Tokyo University of Science, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[\n  1\n  ]  Cisco Networking Academy. 2019. Cisco Packet Tracer: Network Simulation Tool built by Cisco version 8.0.1. https:\/\/www.netacad.com\/ja\/courses\/packet-tracer  [1] Cisco Networking Academy. 2019. Cisco Packet Tracer: Network Simulation Tool built by Cisco version 8.0.1. https:\/\/www.netacad.com\/ja\/courses\/packet-tracer"},{"key":"e_1_3_2_1_2_1","unstructured":"[\n  2\n  ]  O. Santos and J. Muniz. 2017. CCNA Cyber Ops Secfnd 210-250 (1st ed.). Cisco Press. Indianapolis.  [2] O. Santos and J. Muniz. 2017. CCNA Cyber Ops Secfnd 210-250 (1st ed.). Cisco Press. Indianapolis."},{"key":"e_1_3_2_1_3_1","unstructured":"[\n  3\n  ]  O. Santos and J. Muniz. 2017. CCNA Cyber Ops Secops 210-255 (1st ed.). Cisco Press. Indianapolis.  [3] O. Santos and J. Muniz. 2017. CCNA Cyber Ops Secops 210-255 (1st ed.). Cisco Press. Indianapolis."},{"volume-title":"Fundamental Algorithms (3rd. ed.)","author":"Knuth E.","key":"e_1_3_2_1_4_1","unstructured":"[ 4 ] Donald E. Knuth . 1997. The Art of Computer Programming , Vol. 1 : Fundamental Algorithms (3rd. ed.) . Addison Wesley Longman Publishing Co., Inc. [4] Donald E. Knuth. 1997. The Art of Computer Programming, Vol. 1: Fundamental Algorithms (3rd. ed.). Addison Wesley Longman Publishing Co., Inc."},{"key":"e_1_3_2_1_5_1","first-page":"357","volume-title":"Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication. 233-238","author":"Akashi S.","unstructured":"[ 5 ] S. Akashi and Y. Tong . 2019. Classification of DHCP Spoofing and Effectiveness of DHCP Snooping . In Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication. 233-238 . ISBN:978-989-758- 357 - 355 [5] S. Akashi and Y. Tong. 2019. Classification of DHCP Spoofing and Effectiveness of DHCP Snooping. In Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication. 233-238. ISBN:978-989-758-357-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"[\n  6\n  ]  S. Akashi and Y. Tong. 2019. A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing. DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information TechnologyJuly 2019 pp 267\u2013272. https:\/\/doi.org\/10.1145\/3352411.3356103    10.1145\/3352411.3356103\n[6] S. Akashi and Y. Tong. 2019. A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing. DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information TechnologyJuly 2019 pp 267\u2013272. https:\/\/doi.org\/10.1145\/3352411.3356103","DOI":"10.1145\/3352411.3356103"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437802.3437838"},{"key":"e_1_3_2_1_8_1","first-page":"5","volume-title":"Proceedings of the International Conference on Advanced Information Science and SystemNovember","author":"Akashi S.","year":"2019","unstructured":"[ 8 ] S. Akashi and Y. Tong . 2019. E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing? AISS \u201919 : Proceedings of the International Conference on Advanced Information Science and SystemNovember 2019 , Article No.: 26 , pp 1\u2013 5 . https:\/\/doi.org\/10.1145\/3373477.3373503 10.1145\/3373477.3373503 [8] S. Akashi and Y. Tong. 2019. E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing? AISS \u201919: Proceedings of the International Conference on Advanced Information Science and SystemNovember 2019, Article No.: 26, pp 1\u20135. https:\/\/doi.org\/10.1145\/3373477.3373503"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp078"},{"key":"e_1_3_2_1_10_1","first-page":"2421","volume-title":"The IEEE Conference on Local Computer Networks 30th Anniversary. Lecture Notes in Computer Science","volume":"70","author":"Hwang Y.","year":"2005","unstructured":"[ 10 ] Y. Chen; K. Hwang , Y-K Kwok . 2005 . Filtering of shrew DDoS attacks in frequency domain . The IEEE Conference on Local Computer Networks 30th Anniversary. Lecture Notes in Computer Science , Vol. 70 . Springer-Verlag, Berlin. 8-8. doi:10.1109\/LCN. 2005.70. ISBN 978-0-7695- 2421 - 2424 10.1109\/LCN.2005.70 [10] Y. Chen; K. Hwang, Y-K Kwok. 2005. Filtering of shrew DDoS attacks in frequency domain. The IEEE Conference on Local Computer Networks 30th Anniversary. Lecture Notes in Computer Science, Vol. 70. Springer-Verlag, Berlin. 8-8. doi:10.1109\/LCN.2005.70. ISBN 978-0-7695-2421-4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"[\n  11\n  ]  U. Ben-Porat A. Bremler-Barr and H. Levy. 2013. Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. IEEE Transactions on Computers. Vol. 62. 5(2013). 1031-1043. doi:10.1109\/TC.2012.49 ISSN 0018-9340    10.1109\/TC.2012.49\n[11] U. Ben-Porat A. Bremler-Barr and H. Levy. 2013. Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. IEEE Transactions on Computers. Vol. 62. 5(2013). 1031-1043. doi:10.1109\/TC.2012.49 ISSN 0018-9340","DOI":"10.1109\/TC.2012.49"}],"event":{"name":"DSIT 2021: 2021 4th International Conference on Data Science and Information Technology","acronym":"DSIT 2021","location":"Shanghai China"},"container-title":["2021 4th International Conference on Data Science and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478905.3478950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3478905.3478950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:37Z","timestamp":1750191517000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478905.3478950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":11,"alternative-id":["10.1145\/3478905.3478950","10.1145\/3478905"],"URL":"https:\/\/doi.org\/10.1145\/3478905.3478950","relation":{},"subject":[],"published":{"date-parts":[[2021,7,23]]},"assertion":[{"value":"2021-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}