{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:11:06Z","timestamp":1725484266313},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540000204"},{"type":"electronic","value":"9783540360841"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36084-0_10","type":"book-chapter","created":{"date-parts":[[2007,5,16]],"date-time":"2007-05-16T01:40:00Z","timestamp":1179279600000},"page":"177-198","source":"Crossref","is-referenced-by-count":12,"title":["Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Herv\u00e9","family":"Debar","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Morin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"10_CR1","unstructured":"Browne, H. Arbaugh, W. A., Hugh, J. M., AND Fithen, W. L. A trend analysis of exploitations. In Proceedings of the 2001 IEEE Symposium on Security and Privacy (Oakland, CA, May 2001)."},{"key":"10_CR2","unstructured":"Cert Coordination Center. Multiple intrusion detection systems may be circumvented via %u encoding. Cert-CC Vulnerability Note VU#548515, July 2001."},{"key":"10_CR3","unstructured":"Curry, D., AND Debar, H. Intrusion detection message exchange format data model and extensible markup language (xml) document type definition. Internet Draft (work in progress), December 2001."},{"key":"10_CR4","unstructured":"Debar, H., Dacier, M., AND Wespi, A. Reference Audit Information Generation for Intrusion Detection Systems. In Proceedings of IFIPSEC\u201998 (Vienna, Austria and Budapest, Hungaria, August 31-September 4 1998), pp. 405\u2013417."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Debar, H., AND Wespi, A. Aggregation and correlation of intrusion-detection alerts. In Proceedings of RAID 2001 (Davis, CA, USA, October 2001), pp. 85\u2013103.","DOI":"10.1007\/3-540-45474-8_6"},{"key":"10_CR6","unstructured":"Handley, M., Kreibich, C., AND Paxson, V. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th USENIX Security Symposium (Washington, DC, August 13-17 2001)."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Lippman, R., Haines, J. W., Fried, D. J., Korba, J., AND Das, K. Analysis and results of the 1999 darpa off-line intrusion detection evaluation. In Proceedings of RAID 2000 (October 2000), pp. 162\u2013182.","DOI":"10.1007\/3-540-39945-3_11"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Mchugh, J. The 1998 lincoln laboratory ids evaluation, a critique. In Proceedings of RAID 2000 (Toulouse, France, October 2000), pp. 145\u2013161.","DOI":"10.1007\/3-540-39945-3_10"},{"key":"10_CR9","unstructured":"Mueller, P., AND Shipley, G. To catch a thief. Network Computing (August 2001). http:\/\/www.nwc.com\/1217\/1217f1.html ."},{"key":"10_CR10","unstructured":"Ptacek, T. H., AND Newsham, T. N. Insertion, evasion, and denial of service: Eluding network intrusion detection. Tech. rep., Secure Networks, January 1998."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Puketza, N. J., Chung, M., Olsson, R. A., AND Mukherjee, B. A software platform for testing intrusion detection systems. IEEE Software 14,5 (September\u2013October 1997), 43\u201351.","DOI":"10.1109\/52.605930"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Puketza, N. J., Zhang, K., Chung, M., Mukherjee, B. AND Olsson, R. A. A methodology for testing intrusion detection systems. IEEE Trans. Softw. Eng. 22,10 (October 1996), 719\u2013729.","DOI":"10.1109\/32.544350"},{"key":"10_CR13","unstructured":"Rain Forest Puppy. A look at whisker\u2019s anti-ids tactics. http:\/\/www.wiretrip.net\/rfp\/pages\/whitepapers\/whiskerids.html , 1999."},{"key":"10_CR14","unstructured":"Roesch, M. Snort-lightweight intrusion detection for networks. In Proceedings of LIS A\u201999 (Seattle, Washington, USA, November 7-12 1999)."},{"key":"10_CR15","unstructured":"Wood, M., AND Erlinger, M. Intrusion detection message exchange requirements. Internet draft (work in progress), June 2002."}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36084-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:51:40Z","timestamp":1556412700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36084-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000204","9783540360841"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-36084-0_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}