{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:29Z","timestamp":1763467889324},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874027"},{"type":"electronic","value":"9783540874034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_8","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T07:42:05Z","timestamp":1221637325000},"page":"135-154","source":"Crossref","is-referenced-by-count":27,"title":["Predicting the Resource Consumption of Network Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Holger","family":"Dreger","sequence":"first","affiliation":[]},{"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Sommer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Dharmapurikar, S., Paxson, V.: Robust TCP Stream Reassembly In the Presence of Adversaries. In: Proc. USENIX Security Symposium (2005)"},{"key":"8_CR2","unstructured":"Dreger, H.: Operational Network Intrusion Detection: Resource-Analysis Tradeoffs. PhD thesis, TU M\u00fcnchen (2007), \n                    \n                      http:\/\/www.net.in.tum.de\/~hdreger\/papers\/thesis_dreger.pdf"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-Volume Network Intrusion Detection. In: Proc. ACM Conference on Computer and Communications Security (2004)","DOI":"10.1145\/1030083.1030086"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Gaffney Jr., J.E., Ulvila, J.W.: Evaluation of Intrusion Detectors: A Decision Theory Approach. In: Proc. IEEE Symposium on Security and Privacy (2001)","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Lee, W., Cabrera, J.B., Thomas, A., Balwalli, N., Saluja, S., Zhang, Y.: Performance Adaptation in Real-Time Intrusion Detection Systems. In: Proc. Symposium on Recent Advances in Intrusion Detection (2002)","DOI":"10.1007\/3-540-36084-0_14"},{"issue":"1-2","key":"8_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-2002-101-202","volume":"10","author":"W. Lee","year":"2002","unstructured":"Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward Cost-sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security\u00a010(1-2), 5\u201322 (2002)","journal-title":"Journal of Computer Security"},{"issue":"23\u201324","key":"8_CR7","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks\u00a031(23\u201324), 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"8_CR8","unstructured":"Roesch, M.: Snort: Lightweight Intrusion Detection for Networks. In: Proc. Systems Administration Conference (1999)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Schneider, F., Wallerich, J., Feldmann, A.: Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware. In: Proc. Passive and Active Measurement Conference (2007)","DOI":"10.1007\/978-3-540-71617-4_21"},{"key":"8_CR10","unstructured":"tcp-reduce, \n                    \n                      http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcp-reduce.html"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Vallentin, M., Sommer, R., Lee, J., Leres, C., Paxson, V., Tierney, B.: The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. In: Proc. Symposium on Recent Advances in Intrusion Detection (2007)","DOI":"10.1007\/978-3-540-74320-0_6"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level. IEEE\/ACM Transactions on Networking\u00a05(1) (1997)","DOI":"10.1109\/90.554723"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:57:44Z","timestamp":1619510264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}