{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:18Z","timestamp":1725489918866},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_38","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T03:42:01Z","timestamp":1187149321000},"page":"356-364","source":"Crossref","is-referenced-by-count":1,"title":["Design of Active HoneyPot System"],"prefix":"10.1007","author":[{"given":"Miyoung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Misun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyewon K.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Youngsong","family":"Mun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"38_CR1","unstructured":"Snort Users Manual Snort Release 1.8.1 Martin Roesch 10th Aug. 2001."},{"key":"38_CR2","unstructured":"Byong-koo Kim, Dong-su Kim, Tai-myung Chung, \u201cDesign of Intrusion Detection System based on Hierarchical Architecture,\u201d KIPS, vol. 6,No. 2, Jan. 1999."},{"key":"38_CR3","unstructured":"Hoon-jo Chung, Byong-koo Kim, Tai-myung Chung, \u201cClassification of Intrusion Types and Detection Systems, \u201d KIPS, No. 2, Jan. 1999."},{"key":"38_CR4","unstructured":"Miyoung Kim, Youngsong Mun, \u201cThe Development of HoneyPot System,\u201d Proceedings of the International Conference on Security and Management, Las Vegas, USA, Jun. 2002."},{"key":"38_CR5","unstructured":"Miyoung Kim, Youngsong Mun, Technical Report, \u201cA study on intrusion responding tech-nique using HoneyPot System,\u201d LSRC, Feb. 2003."},{"key":"38_CR6","unstructured":"Brian Laing, Jimmy Alderson, \u201cHow to Guide: Implementing a Network Based Intrusion Detection System,\u201d Internet Security System, 2000."},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"R. Heady, G. Luger, A. Maccabe, and M. Servilla, \u201cThe Architecture of a Network Level Intrusion Detction System,\u201d Technical report, Dept. of Computer Science, University of New Mexico, Aug. 1990.","DOI":"10.2172\/425295"},{"key":"38_CR8","unstructured":"A. Valdes and K. Skinner, \u201cAn Approach to Sensor Correlation,\u201d 3rd International Work-shop on the Recent Advances in Intrusion Detection, Oct. 2000."},{"key":"38_CR9","unstructured":"Sun Microsystems Inc., \u201cInstalling, Administering, and Using the Basic Security Module,\u201d 2550 Garcia Ave., Mountain View, CA 94043, Dec. 1991."},{"key":"38_CR10","unstructured":"G. Vigna and K. Skinner, \u201cThe STAT Tool Suite,\u201d in Proceedings of DISCEX 2000, Hilton Head, South Carolina, Jan. 2000, IEEE Computer Society Press."},{"key":"38_CR11","unstructured":"Steven J. Scott, \u201cThreat Management Systems The State of Intrusion Detection,\u201d http:\/\/www.snort.org , Aug. 2002."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T22:14:29Z","timestamp":1556748869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_38","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}