{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:31:55Z","timestamp":1725535915832},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441905215"},{"type":"electronic","value":"9781441905222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-4419-0522-2_18","type":"book-chapter","created":{"date-parts":[[2009,7,22]],"date-time":"2009-07-22T18:51:53Z","timestamp":1248288713000},"page":"267-278","source":"Crossref","is-referenced-by-count":3,"title":["A Multi-Agent Framework for Anomalies Detection on Distributed Firewalls Using Data Mining Techniques"],"prefix":"10.1007","author":[{"given":"Kamel","family":"Karoui","sequence":"first","affiliation":[]},{"given":"Fakher Ben","family":"Ftima","sequence":"additional","affiliation":[]},{"given":"Henda Ben","family":"Ghezala","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. Sch. of Comput. Sci., Telecommun. and Inf. Syst.(2004) DePaul Univ, USA.","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, M., Chewsick, R.: Network firewalls. IEEE Communications Magazine, (1994), pages 50\u201357.","DOI":"10.1109\/35.312843"},{"key":"18_CR3","unstructured":"Bellovin, M.: Distributed Firewalls. Special Issue on Security, (1999), ISSN 1044\u20136397."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Benelbahri, A., Bouhoula, A.: Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ISCC (2007). 12th Volume, 1\u20134 Page(s):63 \u2013 70.","DOI":"10.1109\/ISCC.2007.4381486"},{"key":"18_CR5","volume-title":"A Secure Mobile Agents Approach for Anomalies Detection on Firewalls, Proceedings of the The 10th International Conference on Information Integration and Web-based Applications and Services, ACM, (iiWAS2008), November 24\u201326","author":"F. Ben Ftima","year":"2008","unstructured":"Ben Ftima, F. Karoui, K., Ben Ghezala, H.: A Secure Mobile Agents Approach for Anomalies Detection on Firewalls, Proceedings of the The 10th International Conference on Information Integration and Web-based Applications and Services, ACM, (iiWAS2008), November 24\u201326, (2008), Linz, Austria."},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/69.553155","volume":"8","author":"MS. Chen","year":"1996","unstructured":"Chen, M.S., Han, J., Yu, P. S.: Data Mining: an over view from a database perspective, IEEE Trans. On knowledge And data Engineering, Vol 8, (1996), 866\u2013883.","journal-title":"On knowledge And data Engineering"},{"key":"18_CR7","unstructured":"Cuppens, F., Cuppens-Boulahia, N., and Garcia-Alfaro, J. (2005). Detection and Removal of Firewall Misconfiguration. In Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security, 154\u2013162."},{"key":"18_CR8","volume-title":"Data Mining-Introductory and Advanced Topics","author":"M H. Dunham","year":"2003","unstructured":"Dunham, M. H.: Data Mining-Introductory and Advanced Topics, Prentice Hall, NJ, (2003)."},{"key":"18_CR9","unstructured":"Eronen, P., Zitting, J.: An Expert System for Analyzing Firewall Rules. Procs of 6th Nordic Workshop on Secure IT-Systems-NordSec (2001)."},{"key":"18_CR10","first-page":"213","volume-title":"Knowldgz Discovery in Databases","author":"W. Frawley","year":"1992","unstructured":"Frawley, W., Piatetsky-Shapiro, G., Matheus, C.: Knowldgz Discovery in Databases: An Overwiew, AI Magazine, fall (1992), 213\u2013228."},{"issue":"7","key":"18_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/176789.176794","volume":"37","author":"MR. Genesereth","year":"1994","unstructured":"Genesereth, M.R., Ketchpel, S.P.: Software Agents, Communications of the ACM, vol.37, no.7, pp. 48\u201353, July (1994).","journal-title":"Communications of the ACM"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Golnabi, K., Min, R., Khan L., Al-Shaer, E.: Analysis of Firewall Policy Rule Using Data Mining Techniques, 10th IEEE\/IFIP Network Operations and Management Symposium - (NOMS06), April (2006)","DOI":"10.1109\/NOMS.2006.1687561"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Ioannidis, S., Keromytis, A., Bellovin, S., Smith, J.: Implementing a Distributed Firewall. Proceedings of CCS\u201900, November (2000).","DOI":"10.1145\/352600.353052"},{"key":"18_CR14","unstructured":"Karoui, K.: MA Overview, published in encyclopaedia of Multimedia Technology and Networking, (2005), Idea Group."},{"key":"18_CR15","unstructured":"Klusch, M., Lodi, S., Moro, G.: The Role of Agents in Distributed Data Mining: issues and benefits, proceedings of the IEEE\/WIC international conference on Intelligent Agents Technology, IEEE CS Press, (2003), 211\u2013217."},{"issue":"3","key":"18_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/295685.298136","volume":"42","author":"DB. Lange","year":"1999","unstructured":"Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents, Communications of the ACM, vol. 42, no. 3, pp. 88\u201389, March (1999).","journal-title":"Communications of the ACM"},{"key":"18_CR17","volume-title":"Data Mining Framework for Constructing Features and Models for Intrusion Detection, Ph.D","author":"W. A. Lee","year":"1999","unstructured":"Lee, W. A Data Mining Framework for Constructing Features and Models for Intrusion Detection, Ph.D. Dissertation, Columbia Univeristy, (1999)."},{"key":"18_CR18","volume-title":"Johnson","author":"R. Murch","year":"1999","unstructured":"Murch, R., Johnson, T.: Intelligent Software Agents, Prentice-Hall, (1999)."},{"key":"18_CR19","unstructured":"Russell, R.: Linux iptables HOWTO, v0.0.2, (1999)."},{"key":"18_CR20","unstructured":"Toshiba Corporation. (2001). Beegent Multi-Agent Framework."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Wack, J., Cutler, K., Pole, J.: Guidelines on Firewalls and Firewall Policy. NIST Recommendations, (2002)","DOI":"10.6028\/NIST.SP.800-41"}],"container-title":["Data Mining and Multi-agent Integration"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-0522-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T16:42:31Z","timestamp":1558456951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-0522-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781441905215","9781441905222"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-0522-2_18","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}