{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:46:56Z","timestamp":1725925616565},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_36","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T16:19:11Z","timestamp":1512663551000},"page":"587-598","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper)"],"prefix":"10.1007","author":[{"given":"Mei-Ling","family":"Chiang","sequence":"first","affiliation":[]},{"given":"Jian-Kai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li-Chi","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yang-Sen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"You-Chi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wen-Yu","family":"Kao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"36_CR1","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceeding of Network and Distributed Systems Security Symposium, pp. 191\u2013206 (2003)"},{"issue":"2","key":"36_CR2","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/2007183.2007189","volume":"45","author":"F Azmandian","year":"2011","unstructured":"Azmandian, F., Moffie, M., Alshawabkeh, M.: Virtual machine monitor-based lightweight intrusion detection. ACM SIGOPS Operating Syst. Rev. 45(2), 38\u201353 (2011)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"issue":"4","key":"36_CR3","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1093\/comjnl\/bxr084","volume":"55","author":"UK Tupakula","year":"2012","unstructured":"Tupakula, U.K., Varadharajan, V.: Dynamic state-based security architecture for detecting security attacks in virtual machines. Comput. J. 55(4), 397\u2013409 (2012)","journal-title":"Comput. J."},{"issue":"3","key":"36_CR4","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s11227-011-0608-2","volume":"66","author":"H Jin","year":"2013","unstructured":"Jin, H., Xiang, G., Zou, D., Wu, S., Zhao, F., Li, M., Zheng, W.: A VMM-based intrusion prevention system in cloud computing environment. J. Supercomputing 66(3), 1133\u20131151 (2013)","journal-title":"J. Supercomputing"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Bharadwaja, S., Weiqing, S., Niamat, M., Fangyang, S.: Collabra: a Xen hypervisor based collaborative intrusion detection system. In: Proceedings of the Eighth International Conference on Information Technology: New Generations, pp. 695\u2013700 (2011)","DOI":"10.1109\/ITNG.2011.123"},{"key":"36_CR6","unstructured":"KVM: \nhttp:\/\/www.linux-kvm.org\/\n\n. Accessed 5 Oct 2017"},{"key":"36_CR7","doi-asserted-by":"publisher","unstructured":"Chierici, A., Veraldi, R.: A quantitative comparison between Xen and KVM. J. Phys. (2010). Conference Series 219, \nhttps:\/\/doi.org\/10.1088\/1742-6596\/219\/4\/042005","DOI":"10.1088\/1742-6596\/219\/4\/042005"},{"key":"36_CR8","unstructured":"OpenStack cloud software: \nhttps:\/\/www.openstack.org\/\n\n. Accessed 5 Oct 2017"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Coit, C.J., Staniford, S., McAlemey, J.: Towards faster string matching for intrusion detection or exceeding the speed of Snort. In: Proceedings of DARPA Information Survivability Conference & Exposition II, vol. 1, pp. 367\u2013373 (2001)","DOI":"10.1109\/DISCEX.2001.932231"},{"issue":"10","key":"36_CR10","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"RS Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Commun. ACM 20(10), 762\u2013772 (1977)","journal-title":"Commun. ACM"},{"issue":"6","key":"36_CR11","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"issue":"4","key":"36_CR12","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1109\/SURV.2011.092311.00082","volume":"14","author":"TH Cheng","year":"2012","unstructured":"Cheng, T.H., Lin, Y.D., Lai, Y.C., Lin, P.C.: Evasion techniques: sneaking through your intrusion detection\/prevention systems. IEEE Commun. Surv. Tutorials 14(4), 1011\u20131020 (2012)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"36_CR13","unstructured":"Netfilter: \nhttp:\/\/www.netfilter.org\n\n. Accessed 5 Oct 2017"},{"key":"36_CR14","unstructured":"Snort: \nhttp:\/\/www.snort.org\n\n. Accessed 5 Oct 2017"},{"key":"36_CR15","unstructured":"TCPDump\/Libpcap: \nhttp:\/\/www.tcpdump.org\n\n. Accessed 5 Oct 2017"},{"key":"36_CR16","unstructured":"Suricata: \nhttp:\/\/www.suricata-ids.org\n\n. Accessed 5 Oct 2017"},{"key":"36_CR17","unstructured":"Iptables: \nhttp:\/\/www.netfilter.org\/projects\/iptables\/index.html\n\n. Accessed 5 Oct 2017"},{"key":"36_CR18","unstructured":"Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, pp. 41\u201346 (2005)"},{"key":"36_CR19","unstructured":"Apache web server: \nhttps:\/\/httpd.apache.org\/\n\n. Accessed 5 Oct 2017"},{"key":"36_CR20","unstructured":"Apache Bench: \nhttps:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html\n\n. Accessed 5 Oct 2017"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T16:35:12Z","timestamp":1512664512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}