{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:07Z","timestamp":1725560167702},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540286608"},{"type":"electronic","value":"9783540318248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11548706_55","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:13:06Z","timestamp":1127830386000},"page":"520-529","source":"Crossref","is-referenced-by-count":0,"title":["A Development of Intrusion Detection and Protection System Using Netfilter Framework"],"prefix":"10.1007","author":[{"given":"Min Wook","family":"Kil","sequence":"first","affiliation":[]},{"given":"Seung Kyeom","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Geuk","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Youngmi","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","unstructured":"Schupp, S.: Limitation of Network Intrusion Detection, \n                    \n                      http:\/\/www.sans.org\/rr\/whitepapers\/detection\/"},{"key":"55_CR2","volume-title":"Intrusion Detection","author":"R.G. Bace","year":"2000","unstructured":"Bace, R.G.: Intrusion Detection. Macmillan Technical Pub., Basingstoke (2000)"},{"key":"55_CR3","unstructured":"Esmaili, M., Safavi-Naini, R., Pieprzyk, J.: Intrusion Detection: a Survey. In: Proceedings of ICCC, pp. 409\u2013414 (1995)"},{"key":"55_CR4","unstructured":"Jeong, B.H., Kim, J.N., Sohn, S.W.: Current Status and Expectation of Techniques for Intrusion Protection System, \n                    \n                      http:\/\/kidbs.itfind.or.kr\/WZIN\/jugidong\/1098\/109801.htm"},{"key":"55_CR5","unstructured":"Shim, D.C.: A trend of Intrusion Detection System. KISDI IT FOCUS 4. Korea Information Strategy Development Institute, pp. 61\u201365 (2001)"},{"key":"55_CR6","unstructured":"Alan, J.: Netfilter and IPTables: A Structural Examination, \n                    \n                      http:\/\/www.sans.org\/rr\/whitepapers\/firewalls\/1392.php"},{"key":"55_CR7","unstructured":"Cho, D.I., Song, K.C., Noh, B.K.: Handbook of Analysis for Detection of Network Intrusion and Hacking. Infobook (2001)"},{"key":"55_CR8","unstructured":"Russell, R., Welte, H.: Linux netfilter Hacking HOWTO, \n                    \n                      http:\/\/www.netfilter.org\/documentation\/HOWTO\/netfilter-hacking-HOWTO.html"},{"key":"55_CR9","unstructured":"Cohen, F.: 50 ways to Defeat Your Intrusion Detection System, \n                    \n                      http:\/\/www.mjidor.com\/50dis.shtml"},{"key":"55_CR10","unstructured":"Andreasson, O.: iptables-tutorial, \n                    \n                      http:\/\/www.0kr.net\/files\/iptables-tutorial.html"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11548706_55.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:58:19Z","timestamp":1619506699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11548706_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540286608","9783540318248"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11548706_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}