{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:51:13Z","timestamp":1725540673430},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106248"},{"type":"electronic","value":"9783642106255"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10625-5_26","type":"book-chapter","created":{"date-parts":[[2009,11,10]],"date-time":"2009-11-10T06:23:01Z","timestamp":1257834181000},"page":"417-430","source":"Crossref","is-referenced-by-count":1,"title":["Network Attack Detection Based on Peer-to-Peer Clustering of SNMP Data"],"prefix":"10.1007","author":[{"given":"Walter","family":"Cerroni","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Monti","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Moro","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Ramilli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2009.4804318","volume":"23","author":"G. Androulidakis","year":"2009","unstructured":"Androulidakis, G., Chatzigiannakis, V., Papavassiliou, S.: Network anomaly detection and classification via opportunistic sampling. IEEE Network\u00a023(1), 6\u201312 (2009)","journal-title":"IEEE Network"},{"key":"26_CR2","first-page":"91","volume-title":"Proceedings of the 15th International Conference on Machine Learning (ICML 1998)","author":"P.S. Bradley","year":"1998","unstructured":"Bradley, P.S., Fayyad, U.M.: Refining initial points for k-means clustering. In: Proceedings of the 15th International Conference on Machine Learning (ICML 1998), pp. 91\u201399. Morgan kaufmann, San Francisco (1998)"},{"key":"26_CR3","unstructured":"Bridges, S.M., Vaughn, R.B.: Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the National Information Systems Security Conference (NISSC), pp. 16\u201319 (2000)"},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1023\/A:1015910917349","volume":"10","author":"J.B.D. Cabrera","year":"2002","unstructured":"Cabrera, J.B.D., Lewis, J.L., Qin, X., Lee, W., Mehra, R.K.: Proactive intrusion detection and distributed denial of service attacks\u2014a case study in security management. Journal of Network System Management\u00a010(2), 225\u2013254 (2002)","journal-title":"Journal of Network System Management"},{"key":"26_CR5","unstructured":"CAIDA. The cooperative association for internet data analysis passive monitor (May 2009), http:\/\/www.caida.org\/data\/monitors\/passive-equinix-chicago.xml"},{"issue":"10","key":"26_CR6","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1109\/TKDE.2008.222","volume":"21","author":"S. Datta","year":"2009","unstructured":"Datta, S., Giannella, C.R., Kargupta, H.: Approximate distributed k-means clustering over a peer-to-peer network. IEEE Transactions on Knowledge and Data Engineering\u00a021(10), 1372\u20131388 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"26_CR7","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Dickerson, J.E., Dickerson, J.A.: Fuzzy network profiling for intrusion detection. In: Proc. of NAFIPS 19th International Conference of the North American Fuzzy Information Processing Society, Atlanta, pp. 301\u2013306 (2000)","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"26_CR9","first-page":"226","volume-title":"KDD 1996 Proceedings","author":"M. Ester","year":"1996","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD 1996 Proceedings, pp. 226\u2013231. AAAI Press, Menlo Park (1996)"},{"key":"26_CR10","volume-title":"Knowledge discovery in databases: an overview","author":"W.J. Frawley","year":"1992","unstructured":"Frawley, W.J., Piatetsky-shapiro, G., Matheus, C.J.: Knowledge discovery in databases: an overview. AAAI Press, Menlo Park (1992)"},{"key":"26_CR11","first-page":"723","volume-title":"Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"O.P. Ghoting","year":"2003","unstructured":"Ghoting, O.P., Otey, M., Parthasarathy, S., Ghoting, A., Li, G., Narravula, S.: Towards NIC-based intrusion detection. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 723\u2013728. ACM Press, New York (2003)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Harrington, D., Presuhn, R., Wijnen, B.: An architecture for describing simple network management protocol (SNMP) management frameworks. IETF RFC 3411 (2002)","DOI":"10.17487\/rfc3411"},{"key":"26_CR13","first-page":"58","volume-title":"Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD 1998)","author":"A. Hinneburg","year":"1998","unstructured":"Hinneburg, A., Hinneburg, E., Keim, D.A.: An efficient approach to clustering in large multimedia databases with noise. In: Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD 1998), pp. 58\u201365. AAAI Press, Menlo Park (1998)"},{"key":"26_CR14","first-page":"221","volume-title":"Large-Scale Parallel KDD Systems, SIGKDD","author":"E.L. Johnson","year":"1999","unstructured":"Johnson, E.L., Kargupta, H.: Collective, hierarchical clustering from distributed, heterogeneous data. In: Large-Scale Parallel KDD Systems, SIGKDD, pp. 221\u2013244. Springer, Heidelberg (1999)"},{"key":"26_CR15","first-page":"84","volume":"1","author":"P. Kabiri","year":"2005","unstructured":"Kabiri, P., Ghorbani, A.A.: Research on intrusion detection and response: A survey. International Journal of Network Security\u00a01, 84\u2013102 (2005)","journal-title":"International Journal of Network Security"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: On the capability of an SOM based intrusion detection system. In: Proceedings of the International Joint Conference on Neural Networks, July 2003, vol.\u00a03, pp. 1808\u20131813 (2003)","DOI":"10.1109\/IJCNN.2003.1223682"},{"key":"26_CR17","first-page":"485","volume-title":"Proceedings of the Biennal International Joint Conference on Artificial Intelligence","author":"M. Klusch","year":"2003","unstructured":"Klusch, M., Lodi, S., Moro, G.: Distributed clustering based on sampling local density estimates. In: Proceedings of the Biennal International Joint Conference on Artificial Intelligence, pp. 485\u2013490. Morgan Kaufmann, San Francisco (2003)"},{"key":"26_CR18","unstructured":"Macqueen, J.B.: Some methods of classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297 (1967)"},{"issue":"12","key":"26_CR19","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1109\/JSAC.2006.884027","volume":"24","author":"J. Mai","year":"2006","unstructured":"Mai, J., Sridharan, A., Chuah, C.-N., Zang, H., Ye, T.: Impact of packet sampling on portscan detection. IEEE Journal on Selected Areas in Communications\u00a024(12), 2285\u20132298 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR20","first-page":"205","volume-title":"Peer-to-Peer Computing","author":"G. Monti","year":"2008","unstructured":"Monti, G., Moro, G.: Multidimensional range query and load balancing in wireless ad hoc and sensor networks. In: Wehrle, K., Kellerer, W., Singhal, S.K., Steinmetz, R. (eds.) Peer-to-Peer Computing, pp. 205\u2013214. IEEE Computer Society, Los Alamitos (2008)"},{"key":"26_CR21","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-540-25840-7_13","volume-title":"Agents and Peer-to-Peer Computing","author":"G. Moro","year":"2004","unstructured":"Moro, G., Ouksel, A.M.: G-grid: A class of scalable and self-organizing data structures for multi-dimensional querying and content routing in P2P networks. In: Moro, G., Sartori, C., Singh, M.P. (eds.) AP2PC 2003. LNCS (LNAI), vol.\u00a02872, pp. 123\u2013137. Springer, Heidelberg (2004)"},{"key":"26_CR22","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA 2001), pp. 5\u20138 (2001)"},{"issue":"2","key":"26_CR23","first-page":"221","volume":"4","author":"Da Costa","year":"2006","unstructured":"Costa Da Silva, J., Klusch, M., Lodi, S., Moro, G.: Privacy-preserving agent-based distributed data clustering. Web Intelligence and Agent Systems\u00a04(2), 221\u2013238 (2006)","journal-title":"Web Intelligence and Agent Systems"},{"key":"26_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3324-9","volume-title":"Density estimation for statistics and data analysis","author":"B.W. Silverman","year":"1986","unstructured":"Silverman, B.W.: Density estimation for statistics and data analysis. Chapman and Hall, London (1986)"},{"issue":"8","key":"26_CR25","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M. Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Transactions on Signal Processing\u00a051(8), 2191\u20132204 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"5","key":"26_CR26","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/949952.940084","volume":"28","author":"G. Vigna","year":"2003","unstructured":"Vigna, G., Valeur, F., Kemmerer, R.A.: Designing and implementing a family of intrusion detection systems. SIGSOFT Software Engineering Notes\u00a028(5), 88\u201397 (2003)","journal-title":"SIGSOFT Software Engineering Notes"},{"issue":"3","key":"26_CR27","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R. Xu","year":"2005","unstructured":"Xu, R., Wunsch II, D.: Survey of clustering algorithms. IEEE Transactions on Neural Networks\u00a016(3), 645\u2013678 (2005)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"26_CR28","first-page":"324","volume-title":"Proceedings of the Fourteenth International Conference on Data Engineering (ICDE 1998)","author":"X. Xu","year":"1998","unstructured":"Xu, X., Ester, M., Kriegel, H.-P., Sander, J.: A distribution-based clustering algorithm for mining in large spatial databases. In: Proceedings of the Fourteenth International Conference on Data Engineering (ICDE 1998), Washington, DC, USA, pp. 324\u2013331. IEEE Computer Society, Los Alamitos (1998)"},{"issue":"17","key":"26_CR29","doi-asserted-by":"publisher","first-page":"4212","DOI":"10.1016\/j.comcom.2008.09.018","volume":"31","author":"J. Yu","year":"2008","unstructured":"Yu, J., Lee, H., Kim, M.-S., Park, D.: Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications\u00a031(17), 4212\u20134219 (2008)","journal-title":"Computer Communications"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Zanero, S., Savaresi, S.M.: Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on Applied Computing (2004)","DOI":"10.1145\/967900.967988"},{"key":"26_CR31","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/ICCNMC.2001.962638","volume-title":"Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC 2001)","author":"R. Zhang","year":"2001","unstructured":"Zhang, R., Qian, D., Bao, C., Wu, W., Guo, X.: Multi-agent based intrusion detection architecture. In: Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC 2001), Washington, DC, USA, p. 494. IEEE Computer Society, Los Alamitos (2001)"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: Birch: An efficient data clustering method for very large databases. In: Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, Montreal, Canada, pp. 103\u2013114 (1996)","DOI":"10.1145\/233269.233324"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality of Service in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10625-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T14:59:57Z","timestamp":1558623597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10625-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106248","9783642106255"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10625-5_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}