{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:37:13Z","timestamp":1725493033574},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405153"},{"type":"electronic","value":"9783540450672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45067-x_20","type":"book-chapter","created":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T20:29:51Z","timestamp":1193257791000},"page":"226-236","source":"Crossref","is-referenced-by-count":16,"title":["Malicious ICMP Tunneling: Defense against the Vulnerability"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ola","family":"Nordstr\u00f6m","sequence":"additional","affiliation":[]},{"given":"Chenghuai","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Andre L. M.","family":"dos Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"20_CR1","unstructured":"CERT Advisory. Denial of service attack tools. http:\/\/www.cert.org\/advisories\/CA-1999-17.html."},{"key":"20_CR2","unstructured":"Backorifice SDK Documents. http:\/\/bo2k.sourceforge.net\/indexnews.html."},{"key":"20_CR3","unstructured":"Root Exploit and Dos in the Linux Kernel. http:\/\/linux.oreillynet.com\/pub\/a\/linux\/2001\/10\/22\/insecurities.html."},{"key":"20_CR4","unstructured":"ISS. Loki icmp tunneling back door. http:\/\/www.iss.net\/securitycenter\/static\/1452.php."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Postel J. Internet control mesage protocol \u2014 darpa internet program protocol specification. RFC 792, September 1981.","DOI":"10.17487\/rfc0792"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Postel J. Internet protocol \u2014 darpa internet program protocol specification. RFC 791, September 1981.","DOI":"10.17487\/rfc0791"},{"key":"20_CR7","unstructured":"Phrack. Loki 2(the implementation). http:\/\/www.phrack.com\/show.php?p=51&a=6."},{"key":"20_CR8","unstructured":"Phrack. Project loki. http:\/\/www.phrack.com\/show.php?p=49&a=6."},{"key":"20_CR9","unstructured":"Guido Van Rooji. Real stateful tcp packet filtering. In 10th USENIX Secutrity Symposium, August 2001."},{"key":"20_CR10","unstructured":"Craig H. Rowland. Covert channels in the tcp\/ip protocol suite. http:\/\/www.firstmonday.dk\/issues\/issue25\/rowland."},{"key":"20_CR11","unstructured":"Sans. Icmp attacks illustrated. http:\/\/www.sans.org\/rr\/threats\/ICMP attacks.php."},{"key":"20_CR12","unstructured":"Sans. Intrusion detection faqs. http:\/\/www.sans.org\/resources\/dfaq\/icmp misuses.php."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45067-X_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T20:05:25Z","timestamp":1556913925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45067-X_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405153","9783540450672"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45067-x_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}