{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:04:29Z","timestamp":1725858269220},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319396385"},{"type":"electronic","value":"9783319396392"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39639-2_6","type":"book-chapter","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T03:25:00Z","timestamp":1466133900000},"page":"63-73","source":"Crossref","is-referenced-by-count":3,"title":["Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Buda","sequence":"first","affiliation":[]},{"given":"Ilona","family":"Bluemke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,18]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Mokube, I., Adams, M.: Honeypots: Concepts, Approaches, and Challenges. doi: 10.1145\/1233341.1233399","DOI":"10.1145\/1233341.1233399"},{"key":"6_CR2","unstructured":"Buda, M.: Implementation and Integration of WEB Application Honeypot System Together with Advanced System for Monitoring and Preliminary data Analysis. Ba diploma, Institute of Computer Science, Warsaw University of Technology, Warsaw (2013) (in polish)"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Bayard, R.J.: Efficiently mining long patterns from databases. In: SIGMOD \u201898 Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, pp. 85\u201393 (1998). doi: 10.1145\/276304.276313","DOI":"10.1145\/276304.276313"},{"key":"6_CR4","unstructured":"Cabaj, K.: The new approach to the knowledge discovery in data streams. Ph.D. thesis, Institute of Computer Science, Warsaw University of Technology, Warsaw (2009) (in polish)"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Biedermann, S., Mink, M., Katzenbeisser, S.: Fast dynamic extracted Honeypots in cloud computing. In: CCSW \u201812 Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, pp. 13\u201318 (2012). doi: 10.1145\/2381913.2381916","DOI":"10.1145\/2381913.2381916"},{"key":"6_CR6","unstructured":"Honeytokens: The Other Honeypot (2016) http:\/\/www.symantec.com\/connect\/articles\/honeyto-kens-other-honeypot . Accessed January 2016"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006\u00a0+\u00a0dataset for NIDS evaluation. In: BADGERS \u201811 Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 29\u201336 (2006). doi: 10.1145\/1978672.1978676","DOI":"10.1145\/1978672.1978676"},{"key":"6_CR8","unstructured":"Honeynet Project, (2016). https:\/\/www.honeynet.org\/node\/158 . Accessed January 2016"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Su, M.Y.: Applying Episode Mining and Pruning to Identify Malicious Online Attacks. doi: 10.1016\/j.compeleceng.2015.08.015","DOI":"10.1016\/j.compeleceng.2015.08.015"},{"key":"6_CR10","unstructured":"Server Message Block, (2016). https:\/\/en.wikipedia.org\/wiki\/Server_Message_Block . Accessed January 2016"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Qin, M., Hwang, K.: Frequent episode rules for Internet anomaly detection. In: Third IEEE International Symposium on Network Computing and Applications, 2004, NCA 2004. Proceedings (2004). doi: 10.1109\/NCA.2004.1347773","DOI":"10.1109\/NCA.2004.1347773"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Mannila, H., Toivonen, H., Verkamo, I.: Discovery of frequent episodes in event sequences. In: Data Mining and Knowledge Discovery, vol. 1, Issue 3 (1997). doi: 10.1023\/A:1009748302351","DOI":"10.1023\/A:1009748302351"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Agarwal, R., Aggarwal, C., Prasad, V.V.V.: A Tree Projection Algorithm for Generation of Frequent Item Sets. In: IBM T. J. Watson Research Center, Yorktown Heights, New York, 10598. doi: 10.1006\/jpdc.2000.1693","DOI":"10.1006\/jpdc.2000.1693"},{"key":"6_CR14","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Elsevier. ISBN-13: 978-0-12-088407-0 (2005)"},{"key":"6_CR15","unstructured":"Buda, M.: The Application of Data Mining Methods to Analyze Data from Honeypot Systems. M.Sc. diploma, Institute of Computer Science, Warsaw University of Technology, Warsaw (2015) (in polish)"}],"container-title":["Advances in Intelligent Systems and Computing","Dependability Engineering and Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39639-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T03:29:14Z","timestamp":1466134154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39639-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319396385","9783319396392"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39639-2_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}