{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:36:10Z","timestamp":1768563370689,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540769682","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76969-9_14","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T06:32:49Z","timestamp":1195021969000},"page":"209-227","source":"Crossref","is-referenced-by-count":7,"title":["Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Solahuddin B.","family":"Shamsuddin","sequence":"first","affiliation":[]},{"given":"Michael E.","family":"Woodward","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"MIT Lincoln Laboratory 1999 DARPA Intrusion Detection Data Sets (1999), http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1999\/1999_data_index.html"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-25978-7_21","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 201\u2013222. Springer, Heidelberg (2004)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: Learning Rules for Anomaly Detection of Hostile Network Traffic. In: Proceeding of the 3rd IEEE International Conference on Data Mining (2003)","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"14_CR4","unstructured":"Luo, S., Marin, G.A.: Modeling Networking Protocols to Test Intrusion Detection Systems. In: LCN 2004. Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (2004)"},{"key":"14_CR5","unstructured":"Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Dokas, P., Kumar, V., Srivastava, J.: Detection of Novel Network Attacks Using Data Mining. In: Proc. of SIAM Conf. Data Mining (2003)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bolzoni, D., Etalle, S., Hartel, P., Zambon, E.: POSEIDON: A 2-Tier Anomaly Based Intrusion Detection System. In: IWIA 2006. Proceedings of the Fourth IEEE International Workshop on Information Assurance, pp. 144\u2013156 (2006)","DOI":"10.1109\/IWIA.2006.18"},{"key":"14_CR7","unstructured":"Vliet, F.V.: Turnover Poseidon: Incremental Learning in Clustering Methods for Anomaly based Intrusion Detection. In: Proceedings of Twente Student Conference on IT, University of Twente (2006)"},{"key":"14_CR8","unstructured":"Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: Proc. of the IEEE Workshop on Information Assurance and Security (June 2001)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","first-page":"323","volume-title":"Advances in Natural Computation","author":"C. Yin","year":"2005","unstructured":"Yin, C., Tian, S., Huang, H., He, J.: Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol.\u00a03612, pp. 323\u2013331. Springer, Heidelberg (2005)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic. Technical report, Florida Tech., technical report CS-2001-4 (April 2001)","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA Off-Line Intrusion Detection Evaluation. MIT Lincoln Lab Technical Report (2000)","DOI":"10.1007\/3-540-39945-3_11"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76969-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T09:28:52Z","timestamp":1737538132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76969-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540769682"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76969-9_14","relation":{},"subject":[]}}