{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:17Z","timestamp":1725496217139},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_4","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"47-57","source":"Crossref","is-referenced-by-count":2,"title":["Mining and Detecting Connection-Chains in Network Traffic"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Almulhem","sequence":"first","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"M. Ranum, \u201cNetwork forensics: Network traffic monitoring,\u201d Network Flight Recorder, Inc., Tech. Rep., 1997."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"S. Staniford-Chen and L. T. Heberlein, \u201cHolding intruders accountable on the internet,\u201d in Proceedings of IEEE Symposium on Security and Privacy, May 1995, pp. 39\u201349.","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"4_CR3","unstructured":"Y. Zhang and V. Paxson, \u201cDetecting stepping stones,\u201d in 9th USENIX Security Symposium, Aug 2000, pp. 171\u2013184."},{"key":"4_CR4","unstructured":"A. Almulhem and I. Traore, \u201cConnection-chains: A review and taxonomy,\u201d ECE Department, University of Victoria, Tech. Rep. ECE-05.4, 12 2005."},{"key":"4_CR5","unstructured":"F. Buchholz and C. Shields, \u201cProviding process origin information to aid in network traceback,\u201d in Proceedings of the 2002 USENIX Annual Technical Conference, 2002."},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/1015040.1015041","volume":"7","author":"B. Carrier","year":"2004","unstructured":"B. Carrier and C. Shields, \u201cThe session token protocol for forensics and traceback,\u201d ACM Trans. Inf. Syst. Secur., vol. 7, no. 3, pp. 333\u2013362, 2004.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR7","unstructured":"H. W. Kang, S. J. Hong, and D. H. Lee, \u201cMatching connection pairs,\u201d in Lecture Notes in Computer Science, vol. 3320, Jan 2004, pp. 642\u2013649."},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/170036.170072","volume":"22","author":"R. Agrawal","year":"1993","unstructured":"R. Agrawal, T. Imielinski, and A. Swami, \u201cMining association rules between sets of items in large databases,\u201d SIGMOD Rec., vol. 22, no. 2, pp. 207\u2013216, 1993.","journal-title":"SIGMOD Rec."},{"key":"4_CR9","unstructured":"P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining. Addison-Wesley, 2006."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"J. Postel, Transmission Control Protocol, RFC 793, sep 1981.","DOI":"10.17487\/rfc0793"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, \u201cMultiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay,\u201d in RAID 2002: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection,, October 2002, pp. 17\u201335.","DOI":"10.1007\/3-540-36084-0_2"},{"key":"4_CR12","unstructured":"\u201cLbnl-ftp-pkt,\u201d http:\/\/www-nrg.ee.lbl.gov\/anonymized-traces.html."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"J. Postel and J. Reynolds, Telnet Protocol Specification, RFC 854, May 1983.","DOI":"10.17487\/rfc0854"},{"key":"4_CR14","unstructured":"C. Lonvick, SSH Protocol Architecture, Cisco Systems, Inc., December 2004."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:47Z","timestamp":1619669567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_4","relation":{},"subject":[]}}