{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:22:30Z","timestamp":1771705350277,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540743194","type":"print"},{"value":"9783540743200","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74320-0_6","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T13:47:48Z","timestamp":1187272068000},"page":"107-126","source":"Crossref","is-referenced-by-count":49,"title":["The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Vallentin","sequence":"first","affiliation":[]},{"given":"Robin","family":"Sommer","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Leres","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Tierney","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Blanc, M., Oudot, L., Glaume, V.: Global Intrusion Detection: Prelude Hybrid IDS. Technical report (2003)"},{"key":"6_CR2","unstructured":"Dreger, H.: Operational Network Intrusion Detection: Resource-Analysis Tradeoffs. PhD thesis, TU M\u00fcnchen (2007)"},{"key":"6_CR3","unstructured":"Dreger, H., Feldmann, A., Mai, M., Paxson, V., Sommer, R.: Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In: Proc. USENIX Security Symposium (2006)"},{"key":"6_CR4","volume-title":"Proc. ACM Conference on Computer and Communications Security","author":"H. Dreger","year":"2004","unstructured":"Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-Volume Network Intrusion Detection. In: Proc. ACM Conference on Computer and Communications Security, ACM Press, New York (2004)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Fox, A., Gribble, S.D., Chawathe, Y., Brewer, E.A., Gauthier, P.: Cluster-Based Scalable Network Services. In: Proc. Symposium on Operating Systems Principles (1997)","DOI":"10.1145\/268998.266662"},{"key":"6_CR6","unstructured":"Intrusion Detection Message Exchange Format, \n                    \n                      http:\/\/www.ietf.org\/html.charters\/idwg-charter.html"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, F.: The Click Modular Router. ACM Transactions on Computer Systems\u00a018(3) (August 2000)","DOI":"10.1145\/354871.354874"},{"key":"6_CR8","volume-title":"Proc. IEEE Symposium on Research on Security and Privacy","author":"C. Kruegel","year":"2002","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.A.: Stateful Intrusion Detection for High-Speed Networks. In: Proc. IEEE Symposium on Research on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"23\u201324","key":"6_CR9","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks\u00a031(23\u201324), 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"6_CR10","unstructured":"Paxson, V., Asanovic, K., Dharmapurikar, S., Lockwood, J., Pang, R., Sommer, R., Weaver, N.: Rethinking Hardware Support for Network Analysis and Intrusion Prevention. In: Proc. USENIX Hot Security (2006)"},{"key":"6_CR11","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proc. National Information Systems Security Conference (1997)"},{"issue":"10","key":"6_CR12","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/32.544350","volume":"22","author":"N.J. Puketza","year":"1996","unstructured":"Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B., Olsson, R.A.: A Methodology for Testing Intrusion Detection Systems. IEEE Transactions on Software Engineering\u00a022(10), 719\u2013729 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR13","unstructured":"Roesch, M.: Snort: Lightweight Intrusion Detection for Networks. In: Proc. Systems Administration Conference (1999)"},{"key":"6_CR14","volume-title":"Proc. IEEE Symposium on Workload Characterization","author":"L. Schaelicke","year":"2005","unstructured":"Schaelicke, L., Freeland, C.: Characterizing Sources and Remedies for Packet Loss in Network Intrusion Detection. In: Proc. IEEE Symposium on Workload Characterization, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Schaelicke, L., Slabach, T., Moore, B., Freeland, C.: Characterizing the Performance of Network Intrusion Detection Sensors. In: Proc. Symposium on Recent Advances in Intrusion Detection (2003)","DOI":"10.1007\/978-3-540-45248-5_9"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Schaelicke, L., Wheeler, K., Freeland, C.: SPANIDS: A Scalable Network Intrusion Detection Loadbalancer. In: Proc. Computing Frontiers Conference (2005)","DOI":"10.1145\/1062261.1062314"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Exploiting Independent State For Network Intrusion Detection. In: Proc. Computer Security Applications Conference (2005)","DOI":"10.1109\/CSAC.2005.24"},{"key":"6_CR18","unstructured":"Vallentin, M.: Transparent Load-Balancing for Network Intrusion Detection Systems. Bachelor\u2019s Thesis, TU M\u00fcnchen (2006)"},{"key":"6_CR19","unstructured":"Vigna, G., Eckmann, S.T., Kemmerer, R.A.: The STAT Tool Suite. In: Proc. DARPA Information Survivability Conference and Exposition (2000)"},{"issue":"1","key":"6_CR20","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1999-7103","volume":"7","author":"G. Vigna","year":"1999","unstructured":"Vigna, G., Kemmerer, R.A.: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security\u00a07(1), 37\u201371 (1999)","journal-title":"Journal of Computer Security"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Vigna, G., Kemmerer, R.A., Blix, P.: Designing a Web of Highly-Configurable Intrusion Detection Sensors. In: Proc. Symposium on Recent Advances in Intrusion Detection (2001)","DOI":"10.1007\/3-540-45474-8_5"},{"key":"6_CR22","volume-title":"Proc. ACM Symposium on Field Programmable Gate Arrays","author":"N. Weaver","year":"2007","unstructured":"Weaver, N., Paxson, V., Gonzalez, J.M.: The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. In: Proc. ACM Symposium on Field Programmable Gate Arrays, February 2007, ACM Press, New York (2007)"},{"key":"6_CR23","unstructured":"Zhang, Y., Paxson, V.: Detecting Stepping Stones. In: Proc. USENIX Security Symposium (2000)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74320-0_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:19:54Z","timestamp":1619518794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74320-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540743194","9783540743200"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74320-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}