{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:25:20Z","timestamp":1725470720670},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540397236"},{"type":"electronic","value":"9783540397250"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11856214_10","type":"book-chapter","created":{"date-parts":[[2006,9,16]],"date-time":"2006-09-16T07:12:21Z","timestamp":1158390741000},"page":"185-205","source":"Crossref","is-referenced-by-count":31,"title":["Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots"],"prefix":"10.1007","author":[{"given":"Corrado","family":"Leita","sequence":"first","affiliation":[]},{"given":"Marc","family":"Dacier","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Massicotte","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","volume-title":"Honeypots: Tracking Hackers","author":"L. Spitzner","year":"2002","unstructured":"Spitzner, L.: Honeypots: Tracking Hackers. Addison-Welsey, Boston (2002)"},{"key":"10_CR2","unstructured":"Provos, N.: A virtual honeypot framework. In: Proceedings of the 12th USENIX Security Symposium, pp. 1\u201314 (2004)"},{"key":"10_CR3","unstructured":"Dacier, M., Pouget, F., Debar, H.: Attack processes found on the internet. In: NATO Symposium IST-041\/RSY-013, Toulouse, France (2004)"},{"key":"10_CR4","unstructured":"Dacier, M., Pouget, F., Debar, H.: Honeypots, a practical mean to validate malicious fault assumptions. In: Proceedings of the 10th Pacific Ream Dependable Computing Conference (PRDC 2004), Tahiti (2004)"},{"key":"10_CR5","unstructured":"Dacier, M., Pouget, F., Debar, H.: Honeypot-based forensics. In: Proceedings of AusCERT Asia Pacific Information Technology Security Conference 2004, Brisbane, Australia (2004)"},{"key":"10_CR6","unstructured":"Dacier, M., Pouget, F., Debar, H.: Towards a better understanding of internet threats to enhance survivability. In: Proceedings of the International Infrastructure Survivability Workshop 2004 (IISW 2004), Lisbonne, Portugal (2004)"},{"key":"10_CR7","unstructured":"Dacier, M., Pouget, F., Debar, H.: Leurre.com: On the advantages of deploying a large scale distributed honeypot platform. In: Proceedings of the E-Crime and Computer Conference 2005 (ECCE 2005), Monaco (2005)"},{"key":"10_CR8","unstructured":"Dacier, M., Pouget, F., Debar, H.: Honeynets: foundations for the development of early warning information systems. In: Kowalik, J., Gorski, J., Sachenko, A. (eds.) Proceedings of the Cyberspace Security and Defense: Research Issues (2005)"},{"key":"10_CR9","unstructured":"CERT: Cert advisory ca-2003-20 w32\/blaster worm (2003)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Leita, C., Mermoud, K., Dacier, M.: Scriptgen: an automated script generation tool for honeyd. In: Proceedings of the 21st Annual Computer Security Applications Conference (2005)","DOI":"10.1109\/CSAC.2005.49"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"S. Needleman","year":"1970","unstructured":"Needleman, S., Wunsch, C.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol.\u00a048(3), 443\u2013453 (1970)","journal-title":"J Mol Biol."},{"key":"10_CR12","unstructured":"Cui, W., Vern, P., Weaver, N., Katz, R.H.: Protocol-independent adaptive replay of application dialog. In: The 13th Annual Network and Distributed System Security Symposium (NDSS) (2006)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/11555827_19","volume-title":"Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks","author":"F.C. Freiling","year":"2005","unstructured":"Freiling, F.C., Holz, T., Wicherski, G.: Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. LNCS, pp. 319\u2013335. Springer, Heidelberg (2005)"},{"key":"10_CR14","unstructured":"The Honeynet Project: Know your enemy: Tracking botnets. Know Your Enemy Whitepapers (2005)"},{"key":"10_CR15","unstructured":"Massicotte, F., Couture, M., De Montigny-Leboeuf, A.: Using a vmware network infrastructure to collect traffic traces for intrusion detection evaluation. In: Proceedings of the 21st Annual Computer Security Applications Conference (2005)"},{"key":"10_CR16","unstructured":"OSVDB: Microsoft windows lsass remote overflow (2006), \n                      \n                        http:\/\/www.osvdb.org\/5248"},{"key":"10_CR17","unstructured":"OSVDB: Microsoft pnp ms05-039 overflow (2005), \n                      \n                        http:\/\/www.osvdb.org\/18605"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11856214_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:19:57Z","timestamp":1619507997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11856214_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540397236","9783540397250"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11856214_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}