{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:56:16Z","timestamp":1725846976116},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319284293"},{"type":"electronic","value":"9783319284309"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28430-9_29","type":"book-chapter","created":{"date-parts":[[2016,1,9]],"date-time":"2016-01-09T09:32:28Z","timestamp":1452331948000},"page":"386-398","source":"Crossref","is-referenced-by-count":1,"title":["Novel Intrusion Detection System for Cloud Computing: A Case Study"],"prefix":"10.1007","author":[{"given":"Ming-Yi","family":"Liao","sequence":"first","affiliation":[]},{"given":"Zhi-Kai","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Mon-Yen","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Chu-Sing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiann-Liang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,10]]},"reference":[{"key":"29_CR1","unstructured":"Netfilter. \n                      http:\/\/www.netfilter.org"},{"key":"29_CR2","unstructured":"Libpcap. \n                      http:\/\/www.tcpdump.org"},{"key":"29_CR3","unstructured":"Snort. \n                      http:\/\/www.snort.org"},{"key":"29_CR4","unstructured":"The Bro Network Security Monitor. \n                      http:\/\/www.bro.org"},{"key":"29_CR5","unstructured":"Wehrle, K., P\u00e4hlke, F., Ritter, H., M\u00fcller, D., Bechler, M.: The Linux Networking Architecture: Design and Implementation of Network Protocols in the Linux Kernel (2004)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Qi, Y., Xu, L., Yang, B., Xue, Y., Li, J.: Packet classification algorithms: from theory to practice. In: INFOCOM 2009, pp. 648\u2013656. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5061972"},{"key":"29_CR7","unstructured":"Finsterbusch, M., Richter, C., Rocha, E., Muller, J.: A survey of payload-based traffic classification approaches. In: IEEE Communications Surverys & Tutorials (2012)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Sicker, D.C., Ohm, P., Grunwald, D.: Legal issues surrounding monitoring during network research. In: Proceedings of the 7th ACM SIGCOMM on Internet Measurement (2007)","DOI":"10.1145\/1298306.1298307"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Rotsos, C., Van Gael, J., Moore, A.W., Ghahramani, Z.: Probabilistic graphical models for semi-supervised traffic classification. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pp. 752\u2013757 (2010)","DOI":"10.1145\/1815396.1815569"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Piskac, P., Novotny, J.: Using of time characteristics in data flow for traffic classification. In: Proceedings of the Autonomous Infrastructure, Management, and Security: Managing the Dynamics of Networks and Services, pp. 173\u2013176 (2011)","DOI":"10.1007\/978-3-642-21484-4_21"},{"issue":"2","key":"29_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/COMST.2006.315851","volume":"8","author":"PC Lin","year":"2006","unstructured":"Lin, P.C., Li, Z.X., Lin, Y.D., Lai, Y.C., Lin, F.: Profiling and accelerating string matching algorithms in three network content security applications. IEEE Commun. Surv. Tutorials 8(2), 24\u201337 (2006)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"29_CR12","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TC.2011.231","volume":"62","author":"C Liu","year":"2013","unstructured":"Liu, C., Wu, J.: Fast deep packet inspection with a dual finite automata. IEEE Trans. Comput. 62(2), 310\u2013321 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Wang, X., Jiang, J., Tang, Y., Liu, B., Wang, X.: StriD2FA: scalable regular expression matching for deep packet inspection. In: 2011 IEEE ICC Conference, pp. 1\u20135 (2011)","DOI":"10.1109\/icc.2011.5963289"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Risso, F., Baldi, M., Morandi, O., Baldini, A., Monclus, P.: Lightweight, payload-based traffic classification: an experimental evaluation. In: IEEE ICC Conference (2008)","DOI":"10.1109\/ICC.2008.1097"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1049\/iet-net.2011.0048","volume":"1","author":"MY Liao","year":"2012","unstructured":"Liao, M.Y., Luo, M.Y., Yang, C.S., Chen, C.H., Wu, P.C., Chen, Y.C.: Design and evaluation of deep packet inspection system: a case study. IET Netw. 1, 2\u20139 (2012)","journal-title":"IET Netw."},{"key":"29_CR16","unstructured":"KVM. \n                      http:\/\/www.linux-kvm.org\/page\/Main_Page"},{"key":"29_CR17","unstructured":"Xen. \n                      http:\/\/www.xenproject.org\/"},{"key":"29_CR18","unstructured":"Khoudali, S., Benzidane, K., Sekkaki, A.: Inter-VM packet inspection in cloud computing. In: Communications, Computers and Applications (MIC-CCA) (2012)"},{"key":"29_CR19","unstructured":"Lee, J.H., Park, M.W., Eon, J.H., Chung, T.M.: Multilevel intrusion detection system and log management in cloud computing. In: ICACT (2011)"},{"key":"29_CR20","unstructured":"Wu, H., Yi, D., Winer, C., Li, Y.: Network security for virtual machine in cloud computing. In: ICCIT 2010 (2010)"},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s11227-011-0608-2","volume":"66","author":"H Jin","year":"2013","unstructured":"Jin, H., Xi, G.F., Zou, D.Q., Wu, S., Zhao, F., Li, M., Zheng, W.: A VMM-based intrusion prevention system in cloud computing environment. J. Supercomputing 66, 1133\u20131151 (2013)","journal-title":"J. Supercomputing"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28430-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:22:59Z","timestamp":1559380979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28430-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319284293","9783319284309"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28430-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}