{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:10:57Z","timestamp":1725484257639},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540000204"},{"type":"electronic","value":"9783540360841"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36084-0_14","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T21:40:00Z","timestamp":1179265200000},"page":"252-273","source":"Crossref","is-referenced-by-count":32,"title":["Performance Adaptation in Real-Time Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Wenke","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o B. D.","family":"Cabrera","sequence":"additional","affiliation":[]},{"given":"Ashley","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Niranjan","family":"Balwalli","sequence":"additional","affiliation":[]},{"given":"Sunmeet","family":"Saluja","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"T. F. Abdelzaher, G. Shin, and N. Bhatti. Performance guarantees for web server end-systems: A control-theoretical approach. IEEE Transactions on Parallel and Distributed Systems, 2001. to appear.","DOI":"10.1109\/71.980028"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3), 2000.","DOI":"10.1145\/357830.357849"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"R. Bace. Intrusion Detection. Macmillan Technical Publishing, 2000.","DOI":"10.6028\/NIST.SP.800-31"},{"key":"14_CR4","volume-title":"Technical report","author":"J.S. Balasubramaniyan","year":"1998","unstructured":"J. S. Balasubramaniyan, J. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni. An architecture for intrusion detection using autonomous agents. Technical report, COAST Laboratory, Department of Computer Science, Purdue University, West Lafayette, IN, 1998."},{"key":"14_CR5","unstructured":"J.B.D. Cabrera, W. Lee, R. K. Prasanth, L. Lewis, and R. K. Mehra. Optimization and control problems in real time intrusion detection. submitted for publication, March 2002."},{"key":"14_CR6","volume-title":"Technical Report CSE-99-2","author":"S. Cheung","year":"1999","unstructured":"S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, and D. Zerkle. The design of GrIDS: A graph-based intrusion detection system. Technical Report CSE-99-2, U.C. Davis Computer Science Department, Davis, CA, 1999."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"C. L. Compton and D. L. Tennenhouse. Collaborative load shedding for mediabased applications. In International Conference on Multimedia Computing and Systems, Boston, MA, May 1994.","DOI":"10.1109\/MMCS.1994.292495"},{"key":"14_CR8","unstructured":"D. Contis, W. Lee, D. E. Schimmel, W. Shi, A. Thomas, Y. Zhang, Jun Li, and C. Clark. A prototype programmable network processor based ids. submitted for publication, March 2002."},{"key":"14_CR9","unstructured":"D. Denning. Information Warfare and Security. Addison Wesley, 1999."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"J.E. Gaffney and J. W. Ulvila. Evaluation of intrusion detectors: A decision theory approach. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"14_CR11","unstructured":"R. Gopalakrishna and E. H. Spafford. A framework for distributed intrusion detection using interest driven cooperating agents. In The 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), October 2001."},{"key":"14_CR12","unstructured":"M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th USENIX Security Symposium, August 2001."},{"key":"14_CR13","unstructured":"L. Kleinrock. Queuing Systems, Vol. 1: Theory. John Wiley & Sons, Inc., 1975."},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"C. Kruegel, F. Valeur, G. Vigna, and R. A. Kemmerer. Stateful intrusion detection for high-speed networks. In Proceedings of 2002 IEEE Symposium on Security and Privacy, May 2002.","DOI":"10.1109\/SECPRI.2002.1004378"},{"key":"14_CR15","unstructured":"W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 2001. to appear."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"L. Liu, C. Pu, K. Schwan, and J. Walpole. Infofilter: Supporting quality of service for fresh information delivery. New Generation Computing Journal, 18(4), August 2000.","DOI":"10.1007\/BF03037550"},{"key":"14_CR17","unstructured":"C. Lu, J. A. Stankovic, T. F. Abdelzaher, G. Tao, S. H. Son, and M. Marley. Performance specifications and metrics for adaptive real-time systems. In Proceedings of the IEEE Real-Time Systems Symposium, December 2000."},{"key":"14_CR18","unstructured":"S. Martello and P. Toth. Knapsack Problems: Algorithms and Computer Implementations. John Wiley & Sons Ltd., 1990."},{"key":"14_CR19","unstructured":"S. McCanne, C. Leres, and V. Jacobson. libpcap. available via anonymous ftp to ftp:\/\/ftp.ee.lbl.gov , 1994."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"J. Nieh and M. S. Lam. The design, implementation and evaluation of SMART: A scheduler for multimedia applications. In Proceedings of the Sixteen ACM Symposium on Operating Systems Principles, October 1997.","DOI":"10.1145\/268998.266677"},{"key":"14_CR21","unstructured":"S. Northcutt. Intrusion Detection: An Analyst\u2019s Handbook. New Riders, 1999."},{"key":"14_CR22","unstructured":"C. H. Papadimitriou and K. Steiglitz. Combinatorial Optimization-Algorithms and Complexity. Prentice-Hall, Inc., 1982."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), December 1999.","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"14_CR24","unstructured":"P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In National Information Systems Security Conference, Baltimore MD, October 1997."},{"key":"14_CR25","unstructured":"T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998. http:\/\/www.aciri.org\/vern\/Pt acek-Newsham-Evasion-98.ps ."},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"N. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. Olsson. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering, 22(10), October 1996.","DOI":"10.1109\/32.544350"},{"key":"14_CR27","unstructured":"M. Roesch. Snort-lightweight intrusion detection for networks. In Proceedings of the USENIX LISA Conference, November 1999. Snort is available at http:\/\/www.snort.org ."},{"key":"14_CR28","unstructured":"L. M. Rossey, R. K. Cunningham, D. J. Fried, J. C. Rabek, R. P. Lippmann, and J. W. Haines. LARIAT: Lincoln adaptable real-time information assurance testbed. In The 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), October 2001."},{"key":"14_CR29","unstructured":"B. Schneier. Secrets & Lies: Digital Security in a Networked World. John Wiley & Sons, Inc., 2000."},{"key":"14_CR30","unstructured":"G. Shipley and P. Mueller. Dragon claws its way to the top. In Network Computing. TechWeb, August 2001."},{"key":"14_CR31","unstructured":"S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle. GrIDS-a graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, 1996."},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"J. A. Stankovic, C. Lu, S. H. Son, and G. Tao. The case for feedback control real-time scheduling. In Proceedings of the EuroMicro Conference on Real-Time Systems, June 1999.","DOI":"10.1109\/EMRTS.1999.777445"},{"key":"14_CR33","volume-title":"SunSHIELD Basic Security Module Guide","author":"SunSoft.","year":"1995","unstructured":"SunSoft. SunSHIELD Basic Security Module Guide. SunSoft, Mountain View, CA, 1995."},{"key":"14_CR34","unstructured":"Top Layer Networks and Internet Security Systems. Gigabit Ethernet intrusion detection solutions: Internet security systems RealSecure network sensors and top layer networks AS3502 gigabit AppSwitch performance test results and configuration notes. White Paper, July 2000."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"G. Vigna, R. A. Kemmerer, and P. Blix. Designing a web of highly-configurable intrusion detection sensors. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), October 2001.","DOI":"10.1007\/3-540-45474-8_5"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36084-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:51:41Z","timestamp":1556398301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36084-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000204","9783540360841"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/3-540-36084-0_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}