{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:53:26Z","timestamp":1777503206364,"version":"3.51.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030493356","type":"print"},{"value":"9783030493363","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_36","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"362-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks"],"prefix":"10.1007","author":[{"given":"Nilesh","family":"Kunhare","sequence":"first","affiliation":[]},{"given":"Ritu","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Joydip","family":"Dhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","volume":"70","author":"MF Umer","year":"2017","unstructured":"Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: techniques and challenges. Comput. Secur. 70, 238\u2013254 (2017)","journal-title":"Comput. Secur."},{"key":"36_CR2","unstructured":"William, S.: Cryptography and Network Security: Principles and Practice, pp. 23\u201350. Prentice-Hall, Inc., New York (1999)"},{"key":"36_CR3","unstructured":"Stallings, W.: Network Security Essentials: Applications and Standards, 4edn. Pearson Education India, New Delhi (2000)"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2015.12.006","volume":"62","author":"Z Inayat","year":"2016","unstructured":"Inayat, Z., Gani, A., Anuar, N.B., Khan, M.K., Anwar, S.: Intrusion response systems: foundations, design, and challenges. J. Netw. Comput. Appl. 62, 53\u201374 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Guillen, E., Padilla, D., Colorado, Y.: Weaknesses and strengths analysis over network-based intrusion detection and prevention systems. In: IEEE Latin-American Conference on Communications, LATINCOM 2009, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/LATINCOM.2009.5305047"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Schaelicke, L., Slabach, T., Moore, B., Freeland, C.: Characterizing the performance of network intrusion detection sensors. In: International Workshop on Recent Advances in Intrusion Detection, pp. 155\u2013172. Springer (2003)","DOI":"10.1007\/978-3-540-45248-5_9"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","volume":"40","author":"N Hoque","year":"2014","unstructured":"Hoque, N., Bhuyan, M.H., Baishya, R.C., Bhattacharyya, D.K., Kalita, J.K.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307\u2013324 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Baker, A.R., Esler, J.: Snort intrusion detection and prevention toolkit, vol.\u00a01. Andrew Williams, Norwich (2007)","DOI":"10.1016\/B978-159749099-3\/50006-9"},{"issue":"6","key":"36_CR9","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1016\/j.jcss.2014.12.012","volume":"81","author":"W Bul\u2019ajoul","year":"2015","unstructured":"Bul\u2019ajoul, W., James, A., Pannu, M.: Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81(6), 981\u2013999 (2015)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"36_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.jnca.2009.07.005","volume":"33","author":"K Salah","year":"2010","unstructured":"Salah, K., Kahtani, A.: Performance evaluation comparison of snort NIDS under linux and windows server. J. Netw. Comput. Appl. 33(1), 6\u201315 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jnca.2013.05.009","volume":"39","author":"Y Meng","year":"2014","unstructured":"Meng, Y., Kwok, L.-F.: Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection. J. Netw. Comput. Appl. 39, 83\u201392 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"36_CR12","doi-asserted-by":"publisher","first-page":"3998","DOI":"10.3390\/s130403998","volume":"13","author":"I Kim","year":"2013","unstructured":"Kim, I., Oh, D., Yoon, M.K., Yi, K., Ro, W.W.: A distributed signature detection method for detecting intrusions in sensor systems. Sensors 13(4), 3998\u20134016 (2013)","journal-title":"Sensors"},{"issue":"6","key":"36_CR13","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Bulajoul, W., James, A., Pannu, M.: Network intrusion detection systems in high-speed traffic in computer networks. In: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE), pp. 168\u2013175. IEEE (2013)","DOI":"10.1109\/ICEBE.2013.26"},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.future.2017.10.016","volume":"80","author":"SAR Shah","year":"2018","unstructured":"Shah, S.A.R., Issac, B.: Performance comparison of intrusion detection systems and application of machine learning to snort system. Future Gener. Comput. Syst. 80, 157\u2013170 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Albin, E., Rowe, N.C.: A realistic experimental comparison of the suricata and snort intrusion-detection systems. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 122\u2013127. IEEE (2012)","DOI":"10.1109\/WAINA.2012.29"},{"issue":"10","key":"36_CR17","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","volume":"54","author":"MH Bhuyan","year":"2011","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying port scans and their detection methodologies. Comput. J. 54(10), 1565\u20131581 (2011)","journal-title":"Comput. J."},{"issue":"4","key":"36_CR18","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"16","key":"36_CR19","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.19026\/rjaset.6.3672","volume":"6","author":"G Nadiammai","year":"2013","unstructured":"Nadiammai, G., Hemalatha, M.: Handling intrusion detection system using snort based statistical algorithm and semi-supervised approach. Res. J. Appl. Sci. Eng. Technol. 6(16), 2914\u20132922 (2013)","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Khamphakdee, N., Benjamas, N., Saiyod, S.: Improving intrusion detection system based on snort rules for network probe attack detection. In: 2014 2nd International Conference on Information and Communication Technology (ICoICT), pp. 69\u201374. IEEE (2014)","DOI":"10.1109\/ICoICT.2014.6914042"},{"issue":"2","key":"36_CR21","first-page":"3776","volume":"10","author":"A Mahajan","year":"2018","unstructured":"Mahajan, A., Gupta, A., Sharma, L.S.: Performance evaluation of different pattern matching algorithms of snort. Int. J. Adv. Netw. Appl. 10(2), 3776\u20133781 (2018)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"36_CR22","unstructured":"Singh, R.R., Tomar, D.S.: Network forensics: detection and analysis of stealth port scanning attack. Scanning 4, 8 (2015)"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303\u2013336 (2013)","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"36_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2014.07.019","volume":"51","author":"MH Bhuyan","year":"2015","unstructured":"Bhuyan, M.H., Bhattacharyya, D., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate ddos attack detection. Pattern Recogn. Lett. 51, 1\u20137 (2015)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"36_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR26","unstructured":"Orebaugh, A., Ramirez, G., Beale, J.: Wireshark & Ethereal Network Protocol Analyzer Toolkit. Elsevier (2006)"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T22:06:02Z","timestamp":1597269962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}