{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:28:26Z","timestamp":1725470906692},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540458913"},{"type":"electronic","value":"9783540458937"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11880905_9","type":"book-chapter","created":{"date-parts":[[2006,9,28]],"date-time":"2006-09-28T12:10:10Z","timestamp":1159445410000},"page":"97-108","source":"Crossref","is-referenced-by-count":4,"title":["An Extensible and Flexible System for Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Gamer","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Sch\u00f6ller","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Bless","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Ari, I., Hong, B., Miller, E., Brandt, S., Long, D.: Managing flash crowds on the internet (2003)"},{"key":"9_CR2","unstructured":"CERT. CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks (2000), http:\/\/www.cert.org\/advisories\/CA-1998-01.html"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45451-9_1","volume-title":"Active Networks","author":"E.Y. Chen","year":"2001","unstructured":"Chen, E.Y.: AEGIS: An active-network-powered defense mechanism against dDoS attacks. In: Marshall, I.W., Nettles, S.M., Wakamiya, N. (eds.) IWAN 2001. LNCS, vol.\u00a02207, pp. 1\u201315. Springer, Heidelberg (2001)"},{"key":"9_CR4","first-page":"182","volume":"00","author":"W.L. Cholter","year":"2002","unstructured":"Cholter, W.L., Narasimhan, P., Sterne, D., Balupari, R., Djahandari, K., Mani, A., Murphy, S.: Iban: Intrusion blocker based on active networks. dance\u00a000, 182 (2002)","journal-title":"dance"},{"key":"9_CR5","unstructured":"Fuhrmann, T., Harbaum, T., Sch\u00f6ller, M., Zitterbart, M.: AMnet 3.0 source code distribution, available from: http:\/\/www.flexinet.de"},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L. Garber","year":"2000","unstructured":"Garber, L.: Denial-of-service attacks rip the internet. Computer\u00a033(4), 12\u201317 (2000)","journal-title":"Computer"},{"key":"9_CR7","unstructured":"Hess, A., Sch\u00f6ller, M., Sch\u00e4fer, G., Wolisz, A., Zitterbart, M.: A dynamic and flexible Access Control and Resource Monitoring Mechanism for Active Nodes (June 2002)"},{"key":"9_CR8","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defense against wormhole attacks inwireless ad hoc networks. Technical report, Department of Computer Science, Rice University (December 2001)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks-extended. Technical Report ISI-TR-2003-569b, USC\/Information Sciences Institute, June 2003 (Original TR, February 2003, updated June 2003)","DOI":"10.1145\/863965.863968"},{"key":"9_CR10","unstructured":"Ioannidis, J., Bellovin, S.M.: Implementing pushback: Router-based defense against DDoS attacks. In: Proceedings of Network and Distributed System Security Symposium, Catamaran Resort Hotel San Diego, California (February 6-8, 2002), 1775 Wiehle Ave., Suite 102, Reston, VA 20190, February 2002. The Internet Society (2002)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Claffy, K.C.: Code-red: a case study on the spread and victims of an internet worm. In: Internet Measurement Workshop, pp. 273\u2013284 (2002)","DOI":"10.1145\/637201.637244"},{"key":"9_CR12","volume-title":"Self-Similar Network Traffic and Performance Evaluation","author":"K. Park","year":"1999","unstructured":"Park, K., Willinger, W.: Self-similar network traffic: An overview. In: Self-Similar Network Traffic and Performance Evaluation, Wiley Interscience, Chichester (1999)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-71500-9_13","volume-title":"Active Networks","author":"L. Ruf","year":"2007","unstructured":"Ruf, L., Wagner, A., Farkas, K., Plattner, B.: A detection and filter system for use against large-scale dDoS attacks in the internet backbone. In: Minden, G.J., Calvert, K.L., Solarski, M., Yamamoto, M. (eds.) Active Networks. LNCS, vol.\u00a03912, pp. 169\u2013187. Springer, Heidelberg (2007)"},{"key":"9_CR14","unstructured":"Schober, S.: Mechanismen zur Erkennung von Distributed-Denial-of-Service-Angriffen in IP-Netzen. Studienarbeit am Institut f\u00fcr Telematik, Universit\u00e4t Karlsruhe (TH) (December 2003)"},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2004.59","volume":"2","author":"C. Shannon","year":"2004","unstructured":"Shannon, C., Moore, D.: The spread of the witty worm. IEEE Security and Privacy\u00a02(4), 46\u201350 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR16","first-page":"193","volume":"00","author":"D. Sterne","year":"2002","unstructured":"Sterne, D., Djahandari, K., Balupari, R., Cholter, W.L., Babson, B., Wilson, B., Narasimhan, P., Purtell, A.: Active network based ddos defense. Dance\u00a000, 193 (2002)","journal-title":"Dance"},{"key":"9_CR17","unstructured":"Xie, L., Smith, P., Banfield, M., Leopold, H., Sterbenz, J., Hutchison, D.: Towards resilient networks using programmable networking technologies. In: Proceedings of IFIP IWAN 2005 (November 2005)"},{"key":"9_CR18","unstructured":"Zseby, T., Molina, M., Raspall, F., Duffield, N.G.: Sampling and filtering techniques for ip packet selection. Internet Draft, draft-ietf-psamp-sample-tech-06.txt, Work in Progress, Internet Engineering Task Force (February 2005)"}],"container-title":["Lecture Notes in Computer Science","Autonomic Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11880905_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:50:15Z","timestamp":1605642615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11880905_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540458913","9783540458937"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11880905_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}