{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:18Z","timestamp":1726064298348},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_24","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"609-634","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigation of Security Issues in Distributed System Monitoring"],"prefix":"10.1007","author":[{"given":"Manjunath","family":"Kotari","sequence":"first","affiliation":[]},{"given":"Niranjan N.","family":"Chiplunkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"24_CR1","unstructured":"Sharpe, R., & Warnicke, E. (2014). Capturing live network of data, Wireshark user\u2019s guide: For Wireshark 1.99. \nhttps:\/\/www.wireshark.org\/docs\/"},{"issue":"2","key":"24_CR2","first-page":"50","volume":"5","author":"H Mittal","year":"2013","unstructured":"Mittal, H., Jain, M., & Banda, L. (2013). Monitoring local area network using remote method invocation. International Journal of Computer Science and Mobile Computing, 5(2), 50\u201355.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"24_CR3","first-page":"260","volume-title":"Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems","author":"DM Moraes","year":"2011","unstructured":"Moraes, D. M., & Duarte, E. P. (2011). A failure detection service for internet-based multi-as distributed systems. In  Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems (pp. 260\u2013267)."},{"key":"24_CR4","first-page":"2206","volume-title":"Proceedings of the Fourteenth European Conference on Information Systems (ECIS)","author":"D Aredo","year":"2006","unstructured":"Aredo, D., & Yildirim, S. (2006). Security issues in adaptive distributed systems. In  Proceedings of the Fourteenth European Conference on Information Systems (ECIS) (pp. 2206\u20132215)."},{"issue":"5","key":"24_CR5","first-page":"14","volume":"3","author":"I Kotenko","year":"2014","unstructured":"Kotenko, I., & Doynikova, E. (2014). Evaluation of computer network security based on attack graphs and security event processing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(5), 14\u201329.","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"24_CR6","first-page":"178","volume":"13","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Xingyu, L., Jian, Y., & Xiao, Y. (2016). A framework of a software defined security architecture. China Communications, 13, 178\u2013188.","journal-title":"China Communications"},{"key":"24_CR7","first-page":"36","volume-title":"Proceedings of 117th Metalcasting Congress, Modern Casting, Vernon Hills, IL","author":"J Wiczer","year":"2015","unstructured":"Wiczer, J., & Wiczer, M. B. (2015). Improving energy efficiency using customized monitoring tools. In  Proceedings of 117th Metalcasting Congress, Modern Casting, Vernon Hills, IL (pp. 36\u201339)."},{"key":"24_CR8","unstructured":"Wireshark Tutorial (\nhttp:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/\n\n), man pages (\nhttp:\/\/www.wireshark.org\/docs\/man-pages\/\n\n), and a detailed FAQ (\nhttp:\/\/www.wireshark.org\/faq.html\n\n) Retrieved April 2015."},{"key":"24_CR9","first-page":"1","volume-title":"A web-based cooperative tool for risk management with adaptive security, future generation computer systems","author":"M Fuginia","year":"2015","unstructured":"Fuginia, M., Hadjichristofib, G., & Teimourikiaa, M. (2015). A web-based cooperative tool for risk management with adaptive security, future generation computer systems (pp. 1\u201316). Nicosia\/Limassol: Frederick University."},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Hernandez, C., Pedraza, L. F., & Salgado, C. (2013). A proposal of traffic model that allows estimating throughput mean values. In  Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops (pp. 517\u2013522). IEEE Computer Society.","DOI":"10.1109\/WAINA.2013.216"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Pop, F., Arcalianu, A., Dobre, C., & Cristea, V. (2011). Enhanced security for monitoring services in large scale distributed systems. In  Proceedings of International Conference on Intelligent Computer Communication and Processing (ICCP) (pp. 549\u2013556). IEEE.","DOI":"10.1109\/ICCP.2011.6047929"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Murugan, M., Kant, K., Raghavan, A., & Du, D. H. C. (2014). FlexStore: A software defined, energy adaptive distributed storage framework. In  Proceedings of 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (pp. 81\u201390). IEEE Computer Society.","DOI":"10.1109\/MASCOTS.2014.18"},{"key":"24_CR13","first-page":"350","volume-title":"Proceedings of 8th International Conference on Network and Service Management (CNSM)","author":"D Jeswani","year":"2012","unstructured":"Jeswani, D., Natu, M., & Ghosh, R. K. (2012). Adaptive monitoring: A framework to adapt passive monitoring using probing. In  Proceedings of 8th International Conference on Network and Service Management (CNSM) (pp. 350\u2013356)."},{"key":"24_CR14","first-page":"1767","volume-title":"Proceedings of International Conference on Systems, Man, and Cybernetics, COEX, Seoul, Korea","author":"MG Penteado","year":"2012","unstructured":"Penteado, M. G., & Trevelin, L. C. (2012). JMonitor: A monitoring tool for distributed systems. In  Proceedings of International Conference on Systems, Man, and Cybernetics, COEX, Seoul, Korea (pp. 1767\u20131772)."},{"issue":"4","key":"24_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.9790\/0661-1804012536","volume":"18","author":"M Kotari","year":"2016","unstructured":"Kotari, M., Chiplunkar, N. N., & Nagesh, H. R. (2016). Framework of security mechanisms for monitoring adaptive distributed systems. IOSR Journal of Computer Engineering (IOSR-JCE), 18(4), 25\u201336.","journal-title":"IOSR Journal of Computer Engineering (IOSR-JCE)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Comuzzi, M., & Martinez, R. I. R. (2014). Customized infrastructures for monitoring business processes. In  Proceedings of 8th International Symposium on Service Oriented System Engineering (pp. 122\u2013127). IEEE.","DOI":"10.1109\/SOSE.2014.19"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Oikonomou, G., & Apostolopoulos, T. (2007). A framework for the management of distributed systems based on SNMP. In  Proceedings of 22nd international symposium on Computer and information Sciences(ISCIS) (pp. 78\u201383). IEEE.","DOI":"10.1109\/ISCIS.2007.4456838"},{"key":"24_CR18","unstructured":"Chen, S., Nepal, S., & Pandey, S. (2012). A unified monitoring framework for distributed information system management. In  Proceedings of 8th International Conference on Computing Technology and Information Management (ICCM) (pp. 259\u2013264). IEEE."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Fonseca, H., Rocha, E., Salvador, P., & Nogueira, A. (2014). Framework for collecting social network events. In  Proceedings of 16th International Conference on Telecommunications Network Strategy and Planning Symposium (pp. 1\u20136). IEEE.","DOI":"10.1109\/NETWKS.2014.6959218"},{"key":"24_CR20","first-page":"1","volume-title":"Proceedings of 7th International Symposium on Resilient Control Systems (ISRCS)","author":"M Atighetchi","year":"2014","unstructured":"Atighetchi, M., & Adler, A. (2014). A framework for resilient remote monitoring. In  Proceedings of 7th International Symposium on Resilient Control Systems (ISRCS) (pp. 1\u20138)."},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Jarraya, Y., Raya, S., Soeanua, A., Debbabia, M., Alloucheb, M., & Bergerb, J. (2013). Towards a distributed plan execution monitoring framework. In  Proceedings of 3rd International Symposium on Frontiers in Ambient and Mobile Systems (FAMS), Procedia Computer Science 19 (pp. 1034\u20131039). Elsevier.","DOI":"10.1016\/j.procs.2013.06.144"},{"issue":"2","key":"24_CR22","first-page":"617","volume":"4","author":"J Agbogun","year":"2013","unstructured":"Agbogun, J., & Ejiga, F. A. (2013). Network security management: solutions to network intrusion related problems. International Journal of Computer and Information Technology, 4(2), 617\u2013625.","journal-title":"International Journal of Computer and Information Technology"},{"key":"24_CR23","unstructured":"Feyissa, M. (2007). Monitoring distributed systems for adaptive security. Master thesis, Department of Computer Science, School of Graduate Studies of Addis Ababa University, Addis Ababa."},{"key":"24_CR24","first-page":"595","volume-title":"Design and realization of distributed intelligent monitoring systems using power plant","author":"Z Zhou","year":"2013","unstructured":"Zhou, Z. (2013). Design and realization of distributed intelligent monitoring systems using power plant (pp. 595\u2013601). Berlin: Springer."},{"key":"24_CR25","unstructured":"Schlichting, R. D., & Hiltunen, M. (1998). Designing and implementing adaptive distributed systems. University of Arizona, Arizona. Retrieved Feb, 2018, from \nhttp:\/\/www.cs.arizona.edu\/adaptiveds\/overview.html"},{"issue":"1","key":"24_CR26","first-page":"5","volume":"2","author":"B Sarma","year":"2014","unstructured":"Sarma, B., & Dasgupta, S. (2014). Dynamic load calculation in a distributed system using centralized approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(1), 5\u201310.","journal-title":"International Journal of Advance Research, Ideas and Innovations in Technology"},{"key":"24_CR27","unstructured":"Falai, L. (2007). Observing, monitoring and evaluating distributed systems. Ph.D. Thesis, University of Lisboa, Portugal."},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Hanninen, M., Suhonen, J., Hamalainen, T. D., & Hannikainen, M. (2011). Practical monitoring and analysis tool for WSN testing. In  Proceedings of International Conference on Design and Architectures for Signal and Image Processing (DASIP) (pp. 23\u201332). IEEE.","DOI":"10.1109\/DASIP.2011.6136894"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Qadeer, M. A., & Zahid, M. (2010). Network traffic analysis and intrusion detection using packet sniffer. In  Proceedings of Second International Conference on Communication Software and Networks (pp. 313\u2013317). IEEE.","DOI":"10.1109\/ICCSN.2010.104"},{"key":"24_CR30","unstructured":"RSA elliptic curve cryptography. Retrieved November 30, 2017, from \nhttp:\/\/www.rsa.com\/rsalabs\/node.asp?id=2013"},{"key":"24_CR31","volume-title":"Public key infrastructure implementation and design","author":"S Choudhury","year":"2002","unstructured":"Choudhury, S., Bhatnagar, K., & Haque, W. (2002). Public key infrastructure implementation and design. New York: Hungry Minds."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:05:37Z","timestamp":1577793937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_24","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}