{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:14:35Z","timestamp":1742994875076,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319398136"},{"type":"electronic","value":"9783319398143"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39814-3_14","type":"book-chapter","created":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T04:24:34Z","timestamp":1464755074000},"page":"137-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Advanced Network Threats Using a Similarity Search"],"prefix":"10.1007","author":[{"given":"Milan","family":"\u010cerm\u00e1k","sequence":"first","affiliation":[]},{"given":"Pavel","family":"\u010celeda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"14_CR1","unstructured":"Barbosa, R.R.R., Sadre, R., Pras, A., van de Meent, R.: Simpleweb\/University of twente traffic traces data repository. Technical report TR-CTIT-10-19, Centre for Telematics and Information Technology, University of Twente, April 2010. \n                      http:\/\/eprints.eemcs.utwente.nl\/17829\/"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-77088-6_1","volume-title":"Digital Libraries: Research and Development","author":"M Batko","year":"2007","unstructured":"Batko, M., Novak, D., Zezula, P.: MESSIF: metric similarity search implementation framework. In: Thanos, C., Borri, F., Candela, L. (eds.) Digital Libraries: Research and Development. LNCS, vol. 4877, pp. 1\u201310. Springer, Heidelberg (2007)"},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, K.J.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-24027-5_36","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"P Budikova","year":"2015","unstructured":"Budikova, P., Batko, M., Botorek, J., Zezula, P.: Search-based image annotation: extracting semantics from similar images. In: Mothe, J., et al. (eds.) CLEF 2015. LNCS, vol. 9283, pp. 327\u2013339. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-319-24027-5_36"},{"key":"14_CR5","unstructured":"CAIDA: The CAIDA UCSD Anonymized Internet Traces 2015\u201320150219-130000 (2015). \n                      http:\/\/www.caida.org\/data\/passive\/passive_2015_dataset.xml"},{"key":"14_CR6","unstructured":"Dra\u0161ar, M.: Behavioral detection of distributed dictionary attacks. Doctoral theses, dissertations, Masaryk University, Faculty of Informatics, Brno (2015)"},{"issue":"99","key":"14_CR7","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/COMST.2014.2321898","volume":"PP","author":"R Hofstede","year":"2014","unstructured":"Hofstede, R., \u010celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: from packet capture to data analysis with NetFlow and IPFIX. IEEE Commun. Surv. Tutorials PP(99), 2037\u20132064 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR8","unstructured":"INVEA-TECH a.s.: Flowmon ads. Web page (2015). \n                      https:\/\/www.invea.com\/cs\/produkty-sluzby\/flowmon\/flowmon-ads\n                      \n                    . Accessed 06 Jan 2016"},{"issue":"1","key":"14_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TNET.2006.890115","volume":"15","author":"RR Kompella","year":"2007","unstructured":"Kompella, R.R., Singh, S., Varghese, G.: On scalable attack detection in the network. IEEE\/ACM Trans. Netw. 15(1), 14\u201325 (2007)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kou\u0159il, D., Rebok, T., Jirs\u00edk, T., \u010cegan, J., Dra\u0161ar, M., Vizv\u00e1ry, M., Vykopal, J.: Cloud-based testbed for simulation of cyber attacks. In: 2014 IEEE Network Operations and Management Symposium (NOMS), May 2014","DOI":"10.1109\/NOMS.2014.6838298"},{"issue":"23\u201324","key":"14_CR11","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23\u201324), 2435\u20132463 (1999). \n                      http:\/\/www.icir.org\/vern\/papers\/bro-CN99.pdf","journal-title":"Comput. Netw."},{"key":"14_CR12","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, LISA 1999, pp. 229\u2013238. USENIX Association, Berkeley (1999)"},{"key":"14_CR13","unstructured":"Symantec Corporation: 2015 Internet Security Threat Report. Technical report 20, Symantec Corporation, April 2015. \n                      http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/COMST.2014.2336610","volume":"17","author":"DJ Weller-Fahy","year":"2015","unstructured":"Weller-Fahy, D.J., Borghetti, B.J., Sodemann, A.A.: A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun. Surv. Tutorials 17(1), 70\u201391 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-29151-2","volume-title":"Similarity Search: The Metric Space Approach, Advances in Database Systems","author":"P Zezula","year":"2006","unstructured":"Zezula, P., Amato, G., Dohnal, V., Batko, M.: Similarity Search: The Metric Space Approach, Advances in Database Systems, vol. 32. Springer, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Management and Security in the Age of Hyperconnectivity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39814-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:05:06Z","timestamp":1591401906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39814-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319398136","9783319398143"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39814-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}