{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:39:21Z","timestamp":1758703161174,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493417"},{"type":"electronic","value":"9783030493424"}],"license":[{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49342-4_10","type":"book-chapter","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:49:30Z","timestamp":1597405770000},"page":"100-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Distributed Architecture of Snort IDS in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Mondher","family":"Essid","sequence":"first","affiliation":[]},{"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,15]]},"reference":[{"unstructured":"Sebastian, R., Feng, C., Meinel, C.: Intrusion detection in the cloud. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (2009)","key":"10_CR1"},{"doi-asserted-by":"crossref","unstructured":"Lo, C.C., Huang, C.C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 39th International Conference on Parallel Processing Workshops, pp. 280\u2013284 (2010)","key":"10_CR2","DOI":"10.1109\/ICPPW.2010.46"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"Quick, R.: 5 reasons enterprises are frightened of the cloud (2013). \nhttp:\/\/thenextweb.com\/insider\/2013\/09\/11\/5-reasons-enterprises-are-frightened-of-the-cloud","key":"10_CR4"},{"doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing, National Institute of Standards and Technology Special Publication 800\u2013145 (2011)","key":"10_CR5","DOI":"10.6028\/NIST.SP.800-145"},{"unstructured":"Lublinsky, B., Smith, K.T., Yakubovich, A.: Professional Hadoop Solutions (2013)","key":"10_CR6"},{"unstructured":"Thilina, G.: Hadoop MapReduce v2 Cookbook, Second edn. Packt Publishing Ltd. (2015)","key":"10_CR7"},{"doi-asserted-by":"crossref","unstructured":"El Ayni, M., Jemili, F.: Using MongoDB databases for training and combining intrusion detection datasets. In: International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, vol. 721, pp. 17\u201329 (2017)","key":"10_CR8","DOI":"10.1007\/978-3-319-62048-0_2"},{"doi-asserted-by":"crossref","unstructured":"Bace, R., Mell, P.: Intrusion Detection Systems, National Institute of Standards and Technology (NIST), Technical Report, 800-31 (2001)","key":"10_CR9","DOI":"10.6028\/NIST.SP.800-31"},{"doi-asserted-by":"crossref","unstructured":"Modi, C.N., Patel, D.R., Patel, A., Muttukrishnan, R.: Bayesian classifier and snort based network intrusion detection system in cloud computing. In: Third International Conference on Computing, Communication and Networking Technologies, 26th\u201328th July 2012","key":"10_CR10","DOI":"10.1109\/ICCCNT.2012.6396086"},{"doi-asserted-by":"crossref","unstructured":"Dhage, S.N., Meshram, B.B., Rawat, R.: Intrusion detection system in cloud computing environment. In: International Conference and Workshop on Emerging Trends in Technology TCET, Mumbai, India (2011)","key":"10_CR11","DOI":"10.1145\/1980022.1980076"},{"key":"10_CR12","first-page":"1","volume":"3","author":"M Hafsa","year":"2019","unstructured":"Hafsa, M., Jemili, F.: Comparative study between big data analysis techniques in intrusion detection. Big Data Cogn. Comput. 3, 1 (2019)","journal-title":"Big Data Cogn. Comput."},{"unstructured":"Garcia, S., Grill, M., Stiborek, H., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. J. 45, 100\u2013123 (2014). \nhttp:\/\/dx.doi.org\/10.1016\/j.cose.2014.05.01","key":"10_CR13"},{"doi-asserted-by":"crossref","unstructured":"Essid, M., Jemili, F.: Combining intrusion detection datasets using MapReduce. In: Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, 9\u201312 October 2016","key":"10_CR14","DOI":"10.1109\/SMC.2016.7844977"},{"doi-asserted-by":"crossref","unstructured":"Modia, C.N., Dhiren, R.P., Avi, P., Muttukrishnan, R.: Integrating signature apriori based Network Intrusion Detection System (NIDS) in cloud computing. In: 2nd International Conference on Communication, Computing and Security (ICCCS-2012), pp 905\u2013912 (2012)","key":"10_CR15","DOI":"10.1016\/j.protcy.2012.10.110"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49342-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:52:38Z","timestamp":1597405958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49342-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,15]]},"ISBN":["9783030493417","9783030493424"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49342-4_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,15]]},"assertion":[{"value":"15 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auburn, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}