{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:18Z","timestamp":1761401898412,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319670737"},{"type":"electronic","value":"9783319670744"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67074-4_39","type":"book-chapter","created":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T23:01:15Z","timestamp":1504738875000},"page":"401-410","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Profile-Based Fast Port Scan Detection Method"],"prefix":"10.1007","author":[{"given":"Katalin","family":"Hajd\u00fa-Sz\u00fccs","sequence":"first","affiliation":[]},{"given":"S\u00e1ndor","family":"Laki","sequence":"additional","affiliation":[]},{"given":"Attila","family":"Kiss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,7]]},"reference":[{"key":"39_CR1","unstructured":"Fiware lab community cloud (2016). https:\/\/account.lab.fiware.org"},{"key":"39_CR2","unstructured":"libpcap (2016). http:\/\/www.tcpdump.org\/"},{"key":"39_CR3","unstructured":"Ahanger, T.A.: Port scan - a security concern. Int. J. Eng. Innovative Technol. (IJEIT) 3 (2014)"},{"key":"39_CR4","unstructured":"ArborNetworks: Digital attack map (2013). http:\/\/www.digitalattackmap.com"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","volume":"54","author":"MH Bhuyan","year":"2011","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying port scans and their detection methodologies. Comput. J. 54, 1565\u20131581 (2011)","journal-title":"Comput. J."},{"key":"39_CR6","unstructured":"Christopher, R.: Port Scanning Techniques and the Defense Against Them. SANS Institute (2001)"},{"key":"39_CR7","unstructured":"Cisco: Snort (2016). https:\/\/www.snort.org"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Jaekwang, K., Lee, J.-H.: A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy. In: 4th International Conference on Intelligent Environments, IET (2008)","DOI":"10.1049\/cp:20081126"},{"issue":"3","key":"39_CR9","first-page":"35","volume":"1","author":"V Kumar","year":"2012","unstructured":"Kumar, V., Sangwan, O.P.: Signature based intrusion detection system using snort. Int. J. Comput. Appl. Inf. Technol. 1(3), 35\u201341 (2012). (ISSN: 2278-7720)","journal-title":"Int. J. Comput. Appl. Inf. Technol."},{"key":"39_CR10","unstructured":"Lee, C.B., Roedel, C., Silenok, E.: Detection and characterization of port scan attacks. Univeristy of California, Department of Computer Science and Engineering (2003)"},{"key":"39_CR11","unstructured":"Maciej, K., Janowski, L., Duda, A.: An accurate sampling scheme for detecting SYN flooding attacks and portscans. In: International Conference on Communications (ICC). IEEE (2011)"},{"key":"39_CR12","unstructured":"Offensivehacking: Five phases of hacking, October 2012. https:\/\/offensivehacking.wordpress.com"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Omar, A.-J., Arafat, A.: Network intrusion detection system using neural network classification of attack behavior. J. Adv. Inf. Technol. 6(1) (2015)","DOI":"10.12720\/jait.6.1.1-8"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Panjwani, S., et al.: An experimental evaluation to determine if port scans are precursors to an attack. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 602\u2013611. IEEE (2005)","DOI":"10.1109\/DSN.2005.18"},{"issue":"6","key":"39_CR15","doi-asserted-by":"publisher","first-page":"339","DOI":"10.14257\/ijfgcn.2016.9.6.32","volume":"9","author":"SK Patel","year":"2016","unstructured":"Patel, S.K., Sonker, A.: Rule-based network intrusion detection system for port scanning with efficient port scan detection rules using snort. Int. J. Future Gener. Commun. Netw. 9(6), 339\u2013350 (2016)","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"39_CR16","unstructured":"Soniya, B., Wiscy, M.: Detection of TCP SYN scanning using packet counts and neural network. IEEE International Conference on Signal Image Technology and Internet Based Systems SITIS 2008. IEEE (2008)"},{"issue":"1\u20132","key":"39_CR17","first-page":"105","volume":"10","author":"S Stuart","year":"2002","unstructured":"Stuart, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. J. Comput. Secur. 10(1\u20132), 105\u2013136 (2002)","journal-title":"J. Comput. Secur."},{"key":"39_CR18","unstructured":"Stuart, S.-C., et al.: Grids-a graph based intrusion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, vol. 1 (1996)"},{"key":"39_CR19","unstructured":"Todd, H.L., et al.: A network security monitor. In: Computer Society Symposium, Proceedings. IEEE (1990)"},{"key":"39_CR20","unstructured":"WEBNet77: Multiple ip address lookup (2016). http:\/\/software77.net\/geo-ip\/multi-lookup\/"},{"key":"39_CR21","first-page":"104","volume":"10","author":"Z Jammes","year":"2013","unstructured":"Jammes, Z., Papadaki, M.: Snort IDS ability to detect Nmap and metasploit framework evasion techniques. Adv. Commun. Comput. Netw. Secur. 10, 104 (2013)","journal-title":"Adv. Commun. Comput. Netw. Secur."}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67074-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T16:25:02Z","timestamp":1750868702000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67074-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319670737","9783319670744"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67074-4_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}