{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:06:54Z","timestamp":1774987614021,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030141318","type":"print"},{"value":"9783030141325","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T00:00:00Z","timestamp":1551830400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14132-5_33","type":"book-chapter","created":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T03:59:54Z","timestamp":1551758394000},"page":"409-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of Reactive Systems for Control Network Traffic on the Kubernetes Platform"],"prefix":"10.1007","author":[{"given":"Lubos","family":"Mercl","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Sobeslav","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Mikulecky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,6]]},"reference":[{"key":"33_CR1","unstructured":"Apache Mesos. http:\/\/mesos.apache.org\/. Last Accessed 2 July 2018"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Chi, Y., Jiang, T., Li, X., Gao, C.: Design and implementation of cloud platform intrusion prevention system based on SDN. In: 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), pp. 847\u2013852. IEEE, Beijing, China (2017)","DOI":"10.1109\/ICBDA.2017.8078757"},{"key":"33_CR3","unstructured":"Datadog. https:\/\/www.datadoghq.com\/. Last Accessed 2 July 2018"},{"issue":"4","key":"33_CR4","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Exp. Syst. Appl. 29(4), 713\u2013722 (2005)","journal-title":"Exp. Syst. Appl."},{"key":"33_CR5","unstructured":"Docker - build, ship, and run any app, anywhere. https:\/\/www.docker.com\/. Last Accessed 2 July 2018"},{"key":"33_CR6","unstructured":"Google\/cadvisor: analyzes resource usage and performance characteristics of running containers. https:\/\/github.com\/google\/cadvisor. Last Accessed 2 July 2018"},{"key":"33_CR7","unstructured":"Grafana - the open platform for analytics and monitoring. https:\/\/grafana.com\/. Last Accessed 2 July 2018"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Grossmann, M., Klug, C.: Monitoring container services at the network edge. In: 2017 Proceedings of the 29th International Teletraffic Congress (ITC 29), vol. 1, pp. 130\u2013133. IEEE, Genoa, Italy (2017)","DOI":"10.23919\/ITC.2017.8064348"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Horalek, J., Sobeslav, V.: Analysis of the use of system resources for cloud data security. In: 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWis 2018, Barcelona. Lecture Notes in Computer Science, vol. 10995, pp 101\u2013111. Springer, Berlin (2018)","DOI":"10.1007\/978-3-319-97163-6_9"},{"key":"33_CR10","unstructured":"InfluxData (InfluxDB) - time series database monitoring and analytics. https:\/\/www.influxdata.com\/. Last Accessed 2 July 2018"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Komarek, A., Pavlik, J., Mercl, L., Sobeslav, V.: Hardware layer of ambient intelligence environment implementation. In: Computational Collective Intelligence. ICCCI 2017. Lecture Notes in Computer Science, vol. 10449, pp. 325\u2013334. Springer, Nicosia (2017)","DOI":"10.1007\/978-3-319-67077-5_31"},{"key":"33_CR12","unstructured":"kubernetes\/heapster: compute resource usage analysis and monitoring of container clusters. https:\/\/github.com\/kubernetes\/heapster. Last Accessed 2 July 2018"},{"key":"33_CR13","unstructured":"Kubernetes - production-grade container orchestration. https:\/\/www.kubernetes.io\/. Last Accessed 2 July 2018"},{"issue":"10","key":"33_CR14","first-page":"99","volume":"12","author":"S-W Lin","year":"2016","unstructured":"Lin, S.-W., Ying, K.-C., Lee, C.-Y., Lee, Z.-J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 99\u2013110 (2016)","journal-title":"Appl. Soft Comput."},{"key":"33_CR15","unstructured":"LogicMonitor: SaaS-based performance monitoring platform. https:\/\/www.logicmonitor.com\/. Last Accessed 1 April 2018"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Mercl, L., Pavlik, J.: The comparison of container orchestrators. In: Third International Congress on Information and Communication Technology, ICICT 2018, London. Advances in Intelligent Systems and Computing, vol. 797, pp. 677\u2013685. Springer, Singapore (2018)","DOI":"10.1007\/978-981-13-1165-9_62"},{"issue":"1","key":"33_CR17","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42\u2013157 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"33_CR18","unstructured":"Nagios - The industry standard In IT infrastructure monitoring. https:\/\/nagios.org\/, Last Accessed 1 April 2018"},{"key":"33_CR19","unstructured":"New Relic: digital performance monitoring and management. https:\/\/newrelic.com\/. Last Accessed 2 July 2018"},{"key":"33_CR20","unstructured":"OpenNMS. https:\/\/www.opennms.org\/. Last Accessed 2 July 2018"},{"key":"33_CR21","unstructured":"Prometheus - monitoring system; time series database. https:\/\/prometheus.io\/. Last Accessed 2 July 2018"},{"key":"33_CR22","unstructured":"PRTG network monitor. https:\/\/www.paessler.com\/prtg. Last Accessed 2 July 2018"},{"key":"33_CR23","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1016\/j.jfranklin.2017.06.006","volume":"4","author":"S Roshan","year":"2018","unstructured":"Roshan, S., Miche, Y., Akusok, A., Lendasse, A.: Adaptive and online network intrusion detection system using clustering and extreme learning machines. J. Frankl. Inst.-Eng. Appl. Math. 4, 1752\u20131779 (2018)","journal-title":"J. Frankl. Inst.-Eng. Appl. Math."},{"key":"33_CR24","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","volume":"74","author":"AS Sohal","year":"2018","unstructured":"Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340\u2013354 (2018)","journal-title":"Comput. Secur."},{"key":"33_CR25","unstructured":"Sysdig: kubernetes and docker monitoring, container security and more. https:\/\/www.sysdig.com\/. Last Accessed 2 July 2018"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Tsai, P.-H., Hong, H.-J., Cheng, A.-C., Hsu, C.-H.: Distributed analytics in fog computing platforms using tensorflow and kubernetes. In: 19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017, pp. 145\u2013150. IEEE, Seoul; South Korea (2017)","DOI":"10.1109\/APNOMS.2017.8094194"},{"issue":"4","key":"33_CR27","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38\u201343 (2010)","journal-title":"IT Prof."},{"key":"33_CR28","unstructured":"Weave Scopu. https:\/\/www.weave.works\/. Last Accessed 2 July 2018"},{"key":"33_CR29","unstructured":"Zabbix - The enterprise-class open source network monitoring solution. https:\/\/www.zabbix.com\/. Last Accessed 2 July 2018"},{"issue":"4","key":"33_CR30","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TSG.2011.2159818","volume":"2","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796\u2013808 (2011)","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Studies in Computational Intelligence","Intelligent Information and Database Systems: Recent Developments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14132-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:33:19Z","timestamp":1774985599000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-14132-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,6]]},"ISBN":["9783030141318","9783030141325"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14132-5_33","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,6]]},"assertion":[{"value":"6 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yogyakarta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}