{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:41:36Z","timestamp":1742985696543,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319699103"},{"type":"electronic","value":"9783319699110"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69911-0_4","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T10:05:36Z","timestamp":1508493936000},"page":"47-61","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Prevention System Decision Diagram in Security-as-a-Service Solutions"],"prefix":"10.1007","author":[{"given":"Tytus","family":"Kurek","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Niemiec","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Lason","sequence":"additional","affiliation":[]},{"given":"Andrzej R.","family":"Pach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bahrololum, M., Khaleghi, M.: Anomaly intrusion detection system using Gaussian mixture model. In 3rd International Conference on Convergence and Hybrid Information Technology, pp. 1162\u20131167 (2008)","DOI":"10.1109\/ICCIT.2008.17"},{"key":"4_CR2","unstructured":"Asia-Pacific Security Appliance Market to Reach $2.6bn: IDC. Computer Business Review. http:\/\/www.cbronline.com\/news\/security\/asia-pacific-security-appliance-market-to-reach-26bn-idc-231112 . Accessed 15 March 2017"},{"key":"4_CR3","unstructured":"Brox, A.: Signature-based and anomaly-based intrusion detection: the practice and pitfalls. SC Media. http:\/\/www.scmagazine.com\/signature-based-or-anomaly-based-intrusion-detection-the-practice-and-pitfalls\/article\/30471\/ . Accessed 15 Mar 2017"},{"key":"4_CR4","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/978-3-642-30721-8_30","volume":"287","author":"N Stoianov","year":"2012","unstructured":"Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimedia Communi. Serv. Secur. 287, 304\u2013315 (2012)","journal-title":"Multimedia Communi. Serv. Secur."},{"key":"4_CR5","unstructured":"Tzur-David, S.: Network intrusion prevention systems: signature-based and anomaly detection. Ph.D. thesis, The Hebrew University of Jerusalem (2011)"},{"key":"4_CR6","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MIC.2010.29","volume":"14","author":"A Wool","year":"2010","unstructured":"Wool, A.: Trends in firewall configuration errors: measuring the holes in Swiss cheese. IEEE Internet Comput. 14, 58\u201365 (2010)","journal-title":"IEEE Internet Comput."},{"key":"4_CR7","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A Wool","year":"2004","unstructured":"Wool, A.: A quantitive study of firewall configuration errors. Computer 37, 62\u201367 (2004)","journal-title":"Computer"},{"key":"4_CR8","unstructured":"The Snort Project. https:\/\/www.snort.org\/ . Accessed 15 Mar 2016"},{"key":"4_CR9","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TNSM.2014.041614.120394","volume":"11","author":"V Varadharajan","year":"2014","unstructured":"Varadharajan, V., Tupakula, U.: Security as a service Model for Cloud Environment. IEEE Trans. Netw. Serv. Manag. 11, 60\u201375 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"4_CR10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s10207-015-0292-y","volume":"15","author":"T Kurek","year":"2016","unstructured":"Kurek, T., Niemiec, M., Lason, A.: Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality. Int. J. Inf. Secur. 15(3), 235\u2013250 (2016)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Alsubhi, K., Bouabdallah, N., Boutaba, R.: Performance analysis in intrusion detection and prevention systems. In: IFIP\/IEEE International Symposium on Integrated Network Management, pp. 369\u2013376 (2011)","DOI":"10.1109\/INM.2011.5990713"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Alsubhi, K., Alhazmi, Y., Bouabdallah, N., Boutaba, R.: Rule mode selection intrusion detection and prevention systems. In: IEEE Global Telecommunications Conference, pp. 1\u20136 (2011)","DOI":"10.1109\/GLOCOM.2011.6134252"},{"key":"4_CR13","unstructured":"Chen, Y., Yang, Y.: Policy management for network-based intrusion detection and prevention. In: Network Operations and Management Symposium, pp. 219\u2013232 (2004)"},{"key":"4_CR14","first-page":"1106","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. Int. J. Comput. Telecommun. Netw. 51, 1106\u20131120 (2007)","journal-title":"Comput. Netw. Int. J. Comput. Telecommun. Netw."},{"key":"4_CR15","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/TC.1978.1675141","volume":"27","author":"SB Akers","year":"1978","unstructured":"Akers, S.B.: Binary decision diagrams. IEEE Trans. Comput. 27, 509\u2013516 (1978)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Fulp, E.W., Tarsa, S.J.: Trie-based policy representations for network firewalls. In: IEEE Symposium on Computers and Communications, pp. 434\u2013441 (2005)","DOI":"10.1109\/ISCC.2005.149"},{"key":"4_CR17","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"100","author":"RE Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. 100, 677\u2013691 (1986)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR18","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1, 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"4_CR19","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10207-016-0329-x","volume":"16","author":"L Li","year":"2017","unstructured":"Li, L.: Write-only oblivious RAM-based privacy-preserved access of outsourced data. Int. J. Inf. Secur. 16, 23\u201342 (2017)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR20","unstructured":"Markey, J.: Using decision tree analysis for intrusion detection: a how-to guide. https:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/decision-tree-analysis-intrusion-detection-how-to-guide-33678 . Accessed 07 Sept 2017"},{"issue":"18","key":"4_CR21","doi-asserted-by":"crossref","first-page":"3481","DOI":"10.1002\/sec.1272","volume":"8","author":"T Kurek","year":"2015","unstructured":"Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Commun. Netw. 8(18), 3481\u20133491 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"4_CR22","unstructured":"Greensmith, J., Aickelin, U.: Firewalls, Intrusion Detection Systems and Anti-Virus Scanners. University of Nottingham, Nottingham (2004)"},{"key":"4_CR23","unstructured":"Paquet, C.: Network Security Using Cisco IOS IPS, pp. 437\u2013488. Cisco Press, Indianapolis (2009)"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/0-387-23399-7_2","volume-title":"Intrusion Detection and Correlation","author":"C Kruegel","year":"2005","unstructured":"Kruegel, C., Valeur, F., Vigna, G.: Computer security and intrusion detection. In: Kruegel, C., Valeur, F., Vigna, G. (eds.) Intrusion Detection and Correlation, pp. 10\u201328. Springer, Boston (2005). doi: 10.1007\/0-387-23399-7_2"},{"key":"4_CR25","first-page":"291","volume-title":"Regular Expressions Cookbook","author":"J Goyvaerts","year":"2009","unstructured":"Goyvaerts, J.: Words, lines, and special characters. In: Goyvaerts, J., Levithan, S. (eds.) Regular Expressions Cookbook, p. 291. O\u2019Reilly, Sebastopol (2009)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Yang, Y.E., Prasanna, V.K.: Space-time tradeoff in regular expression matching with semi-deterministic finite automa. In: Proceedings IEEE INFOCOM, pp. 1853\u20131861 (2011)","DOI":"10.1109\/INFCOM.2011.5934986"},{"key":"4_CR27","unstructured":"Jalali, A., Ghamarian, A., Rensink, A.: Incremental pattern matching for regular expressions. In: Proceedings of the 11th International Workshop on Graph Transformation and Visual Modeling Techniques (2012)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69911-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T19:36:13Z","timestamp":1570217773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69911-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319699103","9783319699110"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69911-0_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}