{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:44:47Z","timestamp":1725464687951},"publisher-location":"Berlin\/Heidelberg","reference-count":10,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3540344780"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/11760146_61","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T11:29:38Z","timestamp":1147174178000},"page":"584-589","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors"],"prefix":"10.1007","author":[{"given":"Zhengtao","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Yufeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yabo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Honglan","family":"Lao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"61_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"D. Moore","year":"2003","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security and Privacy\u00a01(4), 33\u201339 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"61_CR2","unstructured":"Twycross, J., Williamson, M.M.: Implementing and testing a virus throttle. In: Proc. of the 12th USENIX Security Symposium, pp. 285\u2013294 (2003)"},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Robertson, S., Siegel, E.V., Miller, M., Stolfo, S.J.: Surveillance detection in high bandwidth environments. In: Proc. of DARPA DISCEX III Conference, pp. 130\u2013139 (2003)","DOI":"10.1109\/DISCEX.2003.1194879"},{"key":"61_CR4","doi-asserted-by":"crossref","unstructured":"Bakos, G., Berk, V.H.: Early detection of internet worm activity by metering ICMP destination unreachable messages. In: Proc. of SPIE - The International Society for Optical Engineering, vol.\u00a04708, pp. 33\u201342 (2002)","DOI":"10.1117\/12.479290"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Proc. of The Seventh International Symposium on Recent Advances in Intrusion Detection, pp. 59\u201381 (2004)","DOI":"10.1007\/978-3-540-30143-1_4"},{"key":"61_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-540-25952-7_47","volume-title":"Intelligence and Security Informatics","author":"Y. Chen","year":"2004","unstructured":"Chen, Y., Dong, Y., Lu, D., Xiang, Z.: Research of characteristics of worm traffic. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 518\u2013519. Springer, Heidelberg (2004)"},{"issue":"1","key":"61_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/90.554723","volume":"5","author":"W. Willinger","year":"1997","unstructured":"Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level. IEEE\/ACM Transactions on Net-working\u00a05(1), 71\u201386 (1997)","journal-title":"IEEE\/ACM Transactions on Net-working"},{"issue":"6","key":"61_CR8","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/90.650143","volume":"5","author":"M.E. Crovella","year":"1997","unstructured":"Crovella, M.E., Bestavros, A.: Self-similarity in World Wide Web traffic: evidence and possible causes. IEEE\/ACM Transactions on Networking\u00a05(6), 835\u2013846 (1997)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"61_CR9","unstructured":"Feldmann, A.: Characteristics of TCP connection arrivals. Technical report (1998), \n                      \n                        http:\/\/www.net.in.tum.de\/~anja\/feldmann\/papers\/ss_conn.ps"},{"key":"61_CR10","unstructured":"Kosinski, B., Cummings, J.: The scientific method: an introduction using reaction time. In: Proce. of the 20th Workshop\/Conference of the Association for Biology Laboratory Education (ABLE), vol.\u00a020, pp. 63\u201384 (1999)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760146_61.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:08:25Z","timestamp":1619492905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760146_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540344780"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11760146_61","relation":{},"subject":[]}}