{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:14:48Z","timestamp":1725574488390},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405504"},{"type":"electronic","value":"9783540450801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45080-1_160","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:54:03Z","timestamp":1294376043000},"page":"1107-1112","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of Alert Analyzer with Data Mining Engine"],"prefix":"10.1007","author":[{"given":"Myung Jin","family":"Lee","sequence":"first","affiliation":[]},{"given":"Moon Sun","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Ho Sung","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Keun Ho","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Ki Young","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"160_CR1","unstructured":"Schnackenberg, D., Djahandari, K., Sterne, D.: Infrastructure for Intrusion Detection and Response. In: Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, SC (January 2000)"},{"key":"160_CR2","unstructured":"Lincoln Lab MIT. DARPA 2000 intrusion detection evaluation datasets (2000), http:\/\/ideval.ll.mit.edu\/2000index.html"},{"key":"160_CR3","unstructured":"Lee, W., Stolfo, S.J., Mok K. W.: A Data Mining Framework for Building Intrusion Detection Models, Computer Science Department. Columbia University 500 West 120th Street, New York, NY 10027"},{"key":"160_CR4","unstructured":"KDD99Cup (1999), http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"160_CR5","doi-asserted-by":"crossref","unstructured":"Lupu, E., Sloman, M.: Conflicts in Policy-based Distributed Systems Management. IEEE Transactions on Software Engineering\u00a025(6) (November 1999)","DOI":"10.1109\/32.824414"},{"key":"160_CR6","doi-asserted-by":"crossref","unstructured":"Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., Waldbusser, S.: Terminology for Policy-Based Management, IETF <draft-ietf-policy-terminology-04.txt> (July 2001)","DOI":"10.17487\/rfc3198"},{"key":"160_CR7","doi-asserted-by":"crossref","unstructured":"Moore, B., Ellesson, E., Strassner, J., Westerinen, A.: Policy Core Information Model -Ver. 1 Spec. IETF RFC3060 (February 2001)","DOI":"10.17487\/rfc3060"},{"key":"160_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","volume-title":"Recent Advances in Intrusion Detection","author":"H. Debar","year":"2001","unstructured":"Debar, H., Wespi, A.: Aggregation and correlation of intrusion-detection alerts. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 85\u2013103. Springer, Heidelberg (2001)"},{"key":"160_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2001","unstructured":"Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 54\u201368. Springer, Heidelberg (2001)"},{"key":"160_CR10","unstructured":"Ning, P., Cui, Y.: An intrusion alert correlator based on prerequisites of intrusions, Technical Report TR-2002-01, Department of Computer Science, North Carolina State University"},{"key":"160_CR11","unstructured":"Moon, H.S., Shin, M.S., Ryu, K.H., Kim, J.O.: Implementation of security policy server\u2019s alert analyzer. ICISC (August 2002)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45080-1_160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T17:06:48Z","timestamp":1559927208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45080-1_160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405504","9783540450801"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45080-1_160","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}