{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:43:51Z","timestamp":1725489831311},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743194"},{"type":"electronic","value":"9783540743200"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74320-0_17","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T13:47:48Z","timestamp":1187272068000},"page":"317-336","source":"Crossref","is-referenced-by-count":0,"title":["Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems"],"prefix":"10.1007","author":[{"given":"John R.","family":"Lange","sequence":"first","affiliation":[]},{"given":"Peter A.","family":"Dinda","sequence":"additional","affiliation":[]},{"given":"Fabi\u00e1n E.","family":"Bustamante","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Allman, M., Barford, P., Krishnamurthy, B., Wang, J.: Tracking the role of adversaries in measuring unwanted traffic. In: The 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (2006)"},{"key":"17_CR2","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The internet motion sensor: A distributed blackhole monitoring system. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (2005)"},{"key":"17_CR3","unstructured":"Bethencourt, J., Franklin, J., Vernon, M.: Mapping internet sensors with probe response attacks. In: Proceedings of the 14th USENIX Security Symposium (2005)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Claffy, K., Crovella, M., Friedman, T., Shannon, C., Spring, N.: Community-oriented network measurement infrastructure workshop report (2006)","DOI":"10.1145\/1129582.1129594"},{"key":"17_CR5","volume-title":"Proceedings of the twentieth ACM symposium on Operating systems principles","author":"M. Costa","year":"2005","unstructured":"Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: End-to-end containment of internet worms. In: Proceedings of the twentieth ACM symposium on Operating systems principles, ACM Press, New York (2005)"},{"key":"17_CR6","unstructured":"Frincke, D.A., Tobin, D., McConnell, J.C., Marconi, J., Polla, D.: A framework for cooperative intrusion detection. In: Proc. 21st NIST-NCSC National Information Systems Security Conference, pp. 361\u2013373 (1998)"},{"key":"17_CR7","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributed Systems Security Symposium (February 2003)"},{"key":"17_CR8","volume-title":"Proceedings of the 2005 IEEE Workshop on Information Assurance and Security","author":"J.B. Grizzard","year":"2005","unstructured":"Grizzard, J.B., Simpson Jr., C.R., Krasser, S., Owen, H.L., Riley, G.F.: Flow based observations from neti@home and honeynet data. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"17_CR9","unstructured":"Jiang, X., Xu, D.: Collapsar: A vm-based architecture for network attack detention center. In: Proceedings of the 13th USENIX Security Symposium (2004)"},{"key":"17_CR10","volume-title":"Proceedings of the 16th IEEE International Symposium on High Performance Distributed Computing","author":"J.R. Lange","year":"2007","unstructured":"Lange, J.R., Dinda, P.A.: Transparent network services via a virtual traffic layer for virtual machines. In: Proceedings of the 16th IEEE International Symposium on High Performance Distributed Computing, IEEE Computer Society Press, Los Alamitos (to appear, 2007)"},{"key":"17_CR11","unstructured":"Larson, S.M., Snow, C.D., Shirts, M., Pande, V.S.: Folding@home and genome@home: Using distributed computing to tackle previously intractable problems in computational biology. In: Grant, R. (ed.) Computational Genomics, Horizon Press (2002)"},{"key":"17_CR12","unstructured":"Libnet, http:\/\/libnet.sourceforge.net\/"},{"key":"17_CR13","unstructured":"Libpcap: Libpcap, http:\/\/sourceforge.net\/projects\/libpcap\/"},{"key":"17_CR14","unstructured":"Liston, T.: The labrea tarpit, http:\/\/labrea.sourceforge.net\/labrea-info.html"},{"key":"17_CR15","unstructured":"Lundin, E., Jonnson, E.: Privacy vs intrusion detection analysis. In: Proceedings of Recent Advances in Intrusion Detection (1999)"},{"key":"17_CR16","unstructured":"Minshall, G.: Tcpdpriv, http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html"},{"key":"17_CR17","unstructured":"Moore, D., Shannon, C., Voelker, G., Savage, S.: Network telescopes: Technial report. Technical Report CS2004-0795, University of California, San Diego (2004)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G.M., Savage, S.: Inferring internet Denial-of-Service activity. In: Prcoeedings of the 2001 USENIX Security Symposium (2001)","DOI":"10.21236\/ADA400003"},{"key":"17_CR19","unstructured":"Pouget, F., Dacier, M., Pham, V.H.: Leurre.com: On the advantages of deploying a large scale distributed honeypot platform. In: Proceedings of ECCE 2005, E-Crime and Computer Conference (2005)"},{"key":"17_CR20","unstructured":"Provos, N.: A virtual honeypot framework. In: Proceedings of the 13th USENIX Security Symposium (2004)"},{"key":"17_CR21","unstructured":"Rajab, M.A., Monrose, F., Terzis, A.: On the effectiveness of distributed worm monitoring. In: Proceedings of the 14th USENIX Security Symposium"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Sapuntzakis, C., Chandra, R., Pfaff, B., Chow, J., Lam, M., Rosenblum, M.: Optimizing the migration of virtual computers. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002)","DOI":"10.1145\/1060289.1060324"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Shavitt, Y., Shir, E.: Dimes: Let the internet measure itself. ACM SIGCOMM Computer Communication Review\u00a035(5) (2005)","DOI":"10.1145\/1096536.1096546"},{"key":"17_CR24","series-title":"IAU Colloquim","volume-title":"Proceedings of the Fifth International Conference on Bioastronomy","author":"W.T. Sullivan","year":"1997","unstructured":"Sullivan, W.T., Werthimer, D., Bowyer, S., Cobb, J., Gedye, D., Anderson, D.: A new major seti project based on project serendip data and 100,000 personal computers. In: Cosmovici, C., Bowyer, S., Werthimer, D. (eds.) Proceedings of the Fifth International Conference on Bioastronomy. IAU Colloquim, vol.\u00a0161, Editrice Compositori, Bologna, Italy (1997)"},{"key":"17_CR25","unstructured":"Sundararaj, A.I., Dinda, P.A.: Towards virtual networks for virtual machine grid computing. In: Proceedings of the 3rd USENIX Virtual Machine Research and Technology Symposium (2004)"},{"key":"17_CR26","volume-title":"Proceedings of the 14th IEEE International Symposium on High-Performance Distributed Computing","author":"A.I. Sundararaj","year":"2005","unstructured":"Sundararaj, A.I., Gupta, A., Dinda, P.A.: Increasing application performance in virtual environments through run-time inference and adaptation. In: Proceedings of the 14th IEEE International Symposium on High-Performance Distributed Computing, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"17_CR27","unstructured":"The Honeynet Project, http:\/\/project.honeynet.org"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45474-8_5","volume-title":"Recent Advances in Intrusion Detection","author":"G. Vigna","year":"2001","unstructured":"Vigna, G., Kemmerer, R.A., Blix, P.: Designing a web of highly-configurable intrusion detection sensors. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, Springer, Heidelberg (2001)"},{"key":"17_CR29","volume-title":"Proceedings of the 20th ACM symposium on Operating systems principles","author":"M. Vrable","year":"2005","unstructured":"Vrable, M., Ma, J., Chen, J., Moore, D., Vandekieft, E., Snoeren, A.C., Voelker, G., Savage, S.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In: Proceedings of the 20th ACM symposium on Operating systems principles, ACM Press, New York (2005)"},{"key":"17_CR30","unstructured":"Weaver, N., Paxson, V., Staniford, S.: Wormholes and a honeyfarm: Automatically detecting novel worms. In: DIMACS Large Scale Attacks Workshop (2003)"},{"key":"17_CR31","unstructured":"WinPcap, http:\/\/www.winpcap.org\/"},{"key":"17_CR32","volume-title":"Proceedings of the 10th IEEE International Conference on Network Protocols","author":"J. Xu","year":"2002","unstructured":"Xu, J., Fan, J., Ammar, M., Moon, S.: Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In: Proceedings of the 10th IEEE International Conference on Network Protocols, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"17_CR33","unstructured":"Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the domino overlay system. In: Proceedings of Network and Distributed System Security Symposium (2004)"},{"key":"17_CR34","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"V. Yegneswaran","year":"2004","unstructured":"Yegneswaran, V., Barford, P., Plonka, D.: On the design and use of internet sinks for network abuse monitoring. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74320-0_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:21:35Z","timestamp":1605763295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74320-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540743194","9783540743200"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74320-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}