{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:10:37Z","timestamp":1725516637779},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705413"},{"type":"electronic","value":"9783540705420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70542-0_14","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"267-278","source":"Crossref","is-referenced-by-count":4,"title":["A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Leo","family":"Juan","sequence":"first","affiliation":[]},{"given":"Christian","family":"Kreibich","sequence":"additional","affiliation":[]},{"given":"Chih-Hung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Group, N.: Network IPS Testing Procedure (V4.0) (2006), \n                    \n                      http:\/\/www.nss.co.uk\/certification\/ips\/nss-nips-v40-testproc.pdf"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Shankar, U., Paxson, V.: Active mapping: resisting NIDS evasion without altering traffic. In: Proc. Symposium on Security and Privacy, pp. 44\u201361 (2003)","DOI":"10.1109\/SECPRI.2003.1199327"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"H. Dreger","year":"2005","unstructured":"Dreger, H., Kreibich, C., Paxson, V., Sommer, R.: Enhancing the accuracy of network-based intrusion detection with host-based context. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548. Springer, Heidelberg (2005)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-540-45248-5_11","volume-title":"Recent Advances in Intrusion Detection","author":"G. Taleck","year":"2003","unstructured":"Taleck, G.: Ambiguity Resolution via Passive OS Fingerprinting. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 192\u2013206. Springer, Heidelberg (2003)"},{"key":"14_CR5","unstructured":"Handley, M., Paxson, V., Kreibich, C.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: Proc. USENIX Security Symposium (2001)"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TNET.2003.822645","volume":"12","author":"D. Watson","year":"2004","unstructured":"Watson, D., Smart, M., Malan, G.R., Jahanian, F.: Protocol Scrubbing: Network Security through Transparent Flow Modification. IEEE\/ACM Transactions on Networking\u00a012(2), 261\u2013273 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Pang, R., Paxson, V.: A High-Level Programming Environment for Packet Trace Anonymization and Transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)","DOI":"10.1145\/863955.863994"},{"issue":"23-24","key":"14_CR8","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks\u00a031(23-24), 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"14_CR9","unstructured":"Kreibich, C.: Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. In: Proc. USENIX Technical Conference, FREENIX track (2004)"},{"key":"14_CR10","unstructured":"Biondi, P.: Scapy, a powerful interactive packet manipulation program, \n                    \n                      http:\/\/www.secdev.org\/projects\/scapy\/"},{"key":"14_CR11","unstructured":"Provos, N.: A Virtual Honeypot Framework. In: Proceedings of the 13th USENIX Security Symposium, pp. 1\u201314 (2004)"},{"key":"14_CR12","unstructured":"SourceFire: Snort, the Open Source Network Intrusion Detection System, \n                    \n                      http:\/\/www.snort.org\/"},{"key":"14_CR13","unstructured":"Ptacek, T., Newsham, T.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Inc. (January 1998)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Vigna, G., Robertson, W., Balzarotti, D.: Testing network-based intrusion detection signatures using mutant exploits. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 21\u201330 (2004)","DOI":"10.1145\/1030083.1030088"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Rubin, S., Jha, S., Miller, B.: Automatic Generation and Analysis of NIDS Attacks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), vol.\u00a000, pp. 28\u201338 (2004)","DOI":"10.1109\/CSAC.2004.9"},{"key":"14_CR16","unstructured":"Marty, R.: Thor \u2013 A Tool to Test Intrusion Detection Systems by Variations of Attacks. Master\u2019s thesis, Swiss Federal Institute of Technology, Zurich, Switzerland (2002)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70542-0_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:21:53Z","timestamp":1620015713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70542-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540705413","9783540705420"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70542-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}