{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:01Z","timestamp":1775053441319,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540000204","type":"print"},{"value":"9783540360841","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36084-0_12","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T21:40:00Z","timestamp":1179265200000},"page":"219-238","source":"Crossref","is-referenced-by-count":33,"title":["Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Gorodetski","sequence":"first","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"12_CR1","unstructured":"Aho, A.V., Ullman, J.D.: The Theory of Parsing, Translation, and Compiling, Vol. 1,2, Prentice-Hall, Inc. (1972)"},{"key":"12_CR2","unstructured":"Alessandri, D., Cachin, C., Dacier, M., Deak, O., Julisch, K., Randell, B. Riordan, J., Tscharner, A., Wespi, A., Wuest, C.: Towards a Taxonomy of Intrusion Detection Systems and Attacks. MAFTIA deliverable D3. Version 1.01. Project IST-1999-11583. Malicious-and Accidental-Fault Tolerance for Internet Applications (2001)"},{"key":"12_CR3","unstructured":"Bishop, M.: A standard audit trail format. Technical report, Department of Computer Science, University of California at Davis (1995)"},{"key":"12_CR4","unstructured":"Custom Attack Simulation Language (CASL). Secure Networks (1998)"},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Network Security Modeling and Cyber Attack Simulation Methodology","author":"S.-D. Chi","year":"2001","unstructured":"Chi, S.-D., Park, J.S., Jung, K.-C., Lee, J.-S.: Network Security Modeling and Cyber Attack Simulation Methodology. Lecture Notes in Computer Science, Vol.2119 (2001)"},{"key":"12_CR6","unstructured":"Chung, M., Mukherjee, B. Olsson, R.A., Puketza, N.: Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. Proceedings of the 18th NISSC (1995)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Cohen, F.B.: Information System Attacks: A Preliminary Classification Scheme. Computers and Security, Vol.16, No.1(1997)","DOI":"10.1016\/S0167-4048(97)85785-9"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. IEEE Symposium on Security and Privacy, Berkeley, CA (1999)","DOI":"10.1016\/S0167-4048(99)80115-1"},{"key":"12_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/10722599","volume-title":"RAID\u20192000","author":"F. Cuppens","year":"2000","unstructured":"Cuppens, F., Ortalo, R.: Lambda: A language to model a database for detection of attacks. RAID\u20192000, Lecture Notes in Computer Science, Vol.1907 (2000)"},{"key":"12_CR10","unstructured":"Curry, D.: Intrusion detection message exchange format, extensible markup language (xml) document type definition. draft-ietf-idwg-idmef-xml-02.txt (2000)"},{"key":"12_CR11","unstructured":"Debar, H., Dacier, M., Wespi, A., Lampart, S.: An experimentation workbench for intrusion detection systems. Research Report RZ-2998 (# 93044). IBM Research Division, Zurich Research Laboratory (1998)"},{"key":"12_CR12","unstructured":"Eckmann, S.T., Vigna, G., Kemmerer, R.A.: STATL: An Attack Language for State-based Intrusion Detection. Proceedings of the ACM Workshop on Intrusion Detection, Athens, Greece (2000)"},{"key":"12_CR13","unstructured":"Feiertag, R., Kahn, C., Porras, P., Schnackenberg, D., Staniford-Chen, S., Tung, B.: A common intrusion specification language (cisl). specification draft (1999)"},{"key":"12_CR14","volume-title":"Syntactic Methods in Pattern Recognition","author":"S. Fu","year":"1974","unstructured":"Fu, S.: Syntactic Methods in Pattern Recognition, Academic Press, New York (1974)"},{"key":"12_CR15","volume-title":"Algebra, Languages, Programming","author":"V. Glushkov","year":"1978","unstructured":"Glushkov, V., Tseitlin, G., Yustchenko, E.: Algebra, Languages, Programming. Naukova Dumka Publishers, Kiev (1978) (In Russian)."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Gorodetski, V., Karsayev, O., Kotenko, I., Khabalov, A.: Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, Vol. 2296, Springer Verlag (2002)","DOI":"10.1007\/3-540-45941-3_13"},{"key":"12_CR17","unstructured":"Hailstorm. Users Manual, 1.0 (2000) http:\/\/www.clicktosecure.com\/"},{"key":"12_CR18","unstructured":"Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents, SANDIA REPORT, SAND98-8667 (1998)"},{"key":"12_CR19","unstructured":"Huang, M.-Y., Wicks, T.M.: A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. RAID\u201998, Louvain-la-Neuve (1998)"},{"key":"12_CR20","volume-title":"Computer Crime: A Crimefighter\u2019s Handbook","author":"D. Icove","year":"1995","unstructured":"Icove, D., Seger K., VonStorch, W.: Computer Crime: A Crimefighter\u2019s Handbook, O\u2019Reilly & Associates, Inc., Sebastopol, CA (1995)"},{"key":"12_CR21","unstructured":"IDS Informer 3.0. User Guide. BLADE Software (2001)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Iglun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, Vol. 21, No.3(1995)","DOI":"10.1109\/32.372146"},{"key":"12_CR23","unstructured":"Kemmerer, R.A., Vigna, G.: NetSTAT: A network-based intrusion detection approach. Proceedings of the 14th ACSAC, Scottsdale, Arizona (1998)"},{"key":"12_CR24","volume-title":"Ph.D. Dissertation","author":"I.V. Krsul","year":"1998","unstructured":"Krsul, I.V.: Software Vulnerability Analysis, Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN (1998)"},{"key":"12_CR25","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"U. Lindqvist","year":"1997","unstructured":"Lindqvist, U., Jonsson, E.: How to Systematically Classify Computer Security Intrusions. Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA (1997)"},{"key":"12_CR26","series-title":"Lect Notes Comput Sci","volume-title":"RAID\u20192000","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. RAID\u20192000, Lecture Notes in Computer Science, Vol.1907 (2000)"},{"key":"12_CR27","series-title":"Lect Notes Comput Sci","volume-title":"RAID\u20192000","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: The 1998 Lincoln Laboratory IDS Evaluation: A Critique. RAID\u20192000, Lecture Notes in Computer Science, Vol.1907 (2000)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"McHugh, J.: Intrusion and intrusion detection. International Journal of Information Security, No.1 (2001)","DOI":"10.1007\/s102070100001"},{"key":"12_CR29","unstructured":"Me, L.: Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. RAID\u201998, Louvain-la-Neuve (1998)"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Michel, C., Me, L.: ADeLe: an Attack Description Language for Knowledge-based Intrusion Detection. Proceedings of the 16th International Conference on Information Security, Kluwer (2001)","DOI":"10.1007\/0-306-46998-7_25"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Moitra, S.D., Konda S.L.: A Simulation Model for Managing Survivability of Networked Information Systems, Technical Report CMU\/SEI-2000-TR-020 ESC-TR-2000-020 (2000)","DOI":"10.21236\/ADA387453"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack Modeling for Information Security and Survivability. Technical Note CMU\/SEI-2001-TN-001 (2001)","DOI":"10.21236\/ADA387544"},{"key":"12_CR33","unstructured":"http:\/\/www.ontology.org\/"},{"key":"12_CR34","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. Proceedings of the 7th Usenix Security Symposium (1998)"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Puketza, N., Chung, M., Olsson, R.A., Mukherjee, A Software Platform for Testing Intrusion Detection Systems. IEEE Software, Vol.14, No.5 (1997)","DOI":"10.1109\/52.605930"},{"key":"12_CR36","unstructured":"Stewart, A.J.: Distributed Metastasis: A Computer Network Penetration Methodology. The Packet Factory (1999) (Phrack Magazine, Vol. 9, Issue 55)"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Tambe, M.: Towards Flexible Teamwork. Journal of Artificial Intelligence Research, No.7 (1997)","DOI":"10.1613\/jair.433"},{"key":"12_CR38","unstructured":"Vigna, G., Eckmann, S.T., Kemmerer, R.A.: Attack Languages. Proceedings of the IEEE Information Survivability Workshop, Boston (2000)"},{"key":"12_CR39","volume-title":"RAID\u201999","author":"J. Yuill","year":"1999","unstructured":"Yuill, J., Wu, F., Settle, J., Gong, F., Huang, M.: Intrusion Detection for an On-Going Attack. RAID\u201999, West Lafayette, Indiana, USA (1999)"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., Asbery, J.: Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks, No. 34 (2000)","DOI":"10.1016\/S1389-1286(00)00142-0"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36084-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:51:43Z","timestamp":1556398303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36084-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000204","9783540360841"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/3-540-36084-0_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}