{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:12:10Z","timestamp":1742955130980,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319398136"},{"type":"electronic","value":"9783319398143"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39814-3_19","type":"book-chapter","created":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T04:24:34Z","timestamp":1464755074000},"page":"165-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Vertical Scans Discovered by Naive Detection"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Cejka","sequence":"first","affiliation":[]},{"given":"Marek","family":"Svepes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"unstructured":"Barto\u0161, V., et. al.: Nemea: framework for stream-wise analysis of network traffic. Technical report, CESNET, a.l.e. (2013). \n                      http:\/\/www.cesnet.cz\/wp-content\/uploads\/2014\/02\/trapnemea.pdf","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"Bartos, V., Zadnik, M.: An analysis of correlations of intrusion alerts in an NREN. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 305\u2013309. IEEE (2014)","key":"19_CR2","DOI":"10.1109\/CAMAD.2014.7033255"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","volume":"54","author":"MH Bhuyan","year":"2011","unstructured":"Bhuyan, M.H., et al.: Surveying port scans and their detection methodologies. Comput. J. 54, 1565 (2011)","journal-title":"Comput. J."},{"unstructured":"Cejka, T., Svepes, M.: Vertical Scan Detector README. \n                      https:\/\/github.com\/CESNET\/Nemea-Detectors\/tree\/master\/vportscan_detector","key":"19_CR4"},{"unstructured":"CESNET, a. l. e.: NEMEA: Network Measurements Analysis Framework. \n                      https:\/\/github.com\/CESNET\/Nemea","key":"19_CR5"},{"doi-asserted-by":"crossref","unstructured":"Dainotti, A., et al.: Analysis of a \/0 stealth scan from a botnet. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, pp. 1\u201314. ACM (2012)","key":"19_CR6","DOI":"10.1145\/2398776.2398778"},{"unstructured":"Jung, J., et. al.: Fast portscan detection using sequential hypothesis testing. In: Proceedings 2004 IEEE Symposium on Security and Privacy, pp. 211\u2013225. IEEE (2004)","key":"19_CR7"},{"unstructured":"Lyon, G.F.: Nmap network scanning: the official Nmap project guide to network discovery and security scanning. In: Insecure (2009)","key":"19_CR8"},{"doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: ACM SIGPLAN Notices, vol. 42, pp. 89\u2013100. ACM (2007)","key":"19_CR9","DOI":"10.1145\/1273442.1250746"},{"issue":"23","key":"19_CR10","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"19_CR11","series-title":"Lecture Notes In Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-319-17172-2_11","volume-title":"Traffic Monitoring and Analysis","author":"E Raftopoulos","year":"2015","unstructured":"Raftopoulos, E., Glatz, E., Dimitropoulos, X., Dainotti, A.: How dangerous is internet scanning? In: Steiner, M., Barlet-Ros, P., Bonaventure, O. (eds.) TMA 2015. LNCS, vol. 9053, pp. 158\u2013172. Springer, Heidelberg (2015)"},{"unstructured":"Roesch, M., et al.: Snort: Lightweight intrusion detection for networks. In: LISA, vol. 99, pp. 229\u2013238 (1999)","key":"19_CR12"},{"unstructured":"Sridharan, A., Ye, T., Bhattacharyya, S.: Connectionless port scan detection on the backbone. In: 25th IEEE International Performance, Computing, and Communications Conference. IPCCC 2006, p. 10. IEEE (2006)","key":"19_CR13"}],"container-title":["Lecture Notes in Computer Science","Management and Security in the Age of Hyperconnectivity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39814-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:05:16Z","timestamp":1591401916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39814-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319398136","9783319398143"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39814-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}