{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:06:46Z","timestamp":1743120406198,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_29","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T15:22:11Z","timestamp":1291648931000},"page":"416-429","source":"Crossref","is-referenced-by-count":2,"title":["Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks"],"prefix":"10.1007","author":[{"given":"Rolando","family":"Salazar-Hern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Jes\u00fas E.","family":"D\u00edaz-Verdejo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P. Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J.E., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges. Computers & Security\u00a028, 18\u201328 (2009)","journal-title":"Computers & Security"},{"key":"29_CR2","unstructured":"Axelsson, S.: Intrusion Detection Systems: a Taxonomy and Survey, Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg (1999)"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.csi.2005.07.002","volume":"28","author":"T.S. Sobh","year":"2006","unstructured":"Sobh, T.S.: Wired and Wireless Intrusion Detection System: Classifications, Good Characteristics and State-of-the-art. Computer Standards & Interfaces\u00a028, 670\u2013694 (2006)","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"29_CR4","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O. Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications\u00a029(4), 713\u2013722 (2005)","journal-title":"Expert Systems with Applications"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Reis, M., Paula, F., Fernandes, D., Geus, P.: A Hybrid IDS Architecture Based on the Immune System. In: Anais do Wseg 2002: Workshop em Seguranca de Sistemas Computacionais, Buzios (2002), http:\/\/www.las.ic.unicamp.br\/paulo\/papers\/2002-WSeg-marcelo.reis-fabricio.paula-diego.fernandes-IDS.imuno.pdf","DOI":"10.5753\/sbseg.2002.21273"},{"key":"29_CR6","unstructured":"Tombini, E., Debar, H., Me, L., Ducasse, M.: A serial combination of anomaly and misuse IDSes applied to HTTP traffic. In: 20th Annual Computer Security Applications Conference (2004)"},{"key":"29_CR7","unstructured":"Fontenelle, M.F., Siqueira, G., Holanda, R., Bessa Maia, J., Neuman, J.: Using Statistical Discriminators and Cluster Analysis to P2P and Attack Traffic Monitoring. In: LANOMS, pp. 68\u201377 (2007)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Est\u00e9vez-Tapiador, J.M., Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J.E.: Detection of Web-based Attacks Through Markovian Protocol Parsing. In: 10th Symposium on Computers and Communications, pp. 457\u2013462 (2005)","DOI":"10.1109\/ISCC.2005.51"},{"key":"29_CR9","unstructured":"Est\u00e9vez-Tapiador, J.M.: Detecci\u00f3n de intrusiones en redes basada en anomal\u00edas mediante t\u00e9cnicas de modelado de protocolos (Anomaly-based Network Intrusion Detection using protocol modelling techniques), Ph.D Thesis, Univ. of Granada (2003)"},{"key":"29_CR10","unstructured":"Symantec, Symantec Global Internet Security Threat Report, Trends for July-December 07, Volume XII (2008), http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf"},{"key":"29_CR11","volume-title":"An Introduction to Probability Theory and its Applications","author":"W. Feller","year":"1968","unstructured":"Feller, W.: An Introduction to Probability Theory and its Applications, 3rd edn., vol.\u00a01. John Wiley & Sons, Chichester (1968)","edition":"3"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Frystyk, H.: Hypertext Transfer Protocol \u2013 HTTP\/1.0, RFC1945 (1996)","DOI":"10.17487\/rfc1945"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Berners-Lee, T.: Hypertext Transfer Protocol \u2013 HTTP\/1.1, RFC2068 (1997)","DOI":"10.17487\/rfc2068"},{"key":"29_CR14","unstructured":"Berners-Lee, T., Fielding, R., Masinter, L.: Uniform Resource Identifiers, RFC2396 (1998)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol \u2013 HTTP\/1.1, RFC2616 (1996)","DOI":"10.17487\/rfc2068"},{"issue":"2","key":"29_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE\u00a077(2), 257\u2013285 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11962977_17","volume-title":"Critical Information Infrastructures Security","author":"M. Berm\u00fadez-Edo","year":"2006","unstructured":"Berm\u00fadez-Edo, M., Salazar-Hern\u00e1ndez, R., D\u00edaz-Verdejo, J.E., Garc\u00eda-Teodoro, P.: Proposals on Assessment Environments for Anomaly-based Network Intrusion Detection Systems. In: L\u00f3pez, J. (ed.) CRITIS 2006. LNCS, vol.\u00a04347, pp. 210\u2013221. Springer, Heidelberg (2006)"},{"issue":"4","key":"29_CR18","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing Intrusion Detection Systems: a Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Athanasiades, N., Abler, R., Levine, J., Owen, H., Riley, G.: Intrusion Detection Testing and Benchmarking Methodologies. In: Proc. 1st IEEE International Workshop on Information Assurance IWIA, pp. 63\u201372 (2003)","DOI":"10.1109\/IWIAS.2003.1192459"},{"key":"29_CR20","volume-title":"Pattern Classification and Scene Analysis","author":"R. Duda","year":"1973","unstructured":"Duda, R., Hart, P.: Pattern Classification and Scene Analysis. John Wiley and Sons, Chichester (1973)"},{"key":"29_CR21","volume-title":"Proc. of the 15th International Conference on Machine Learning (ICML 1998)","author":"F. Provost","year":"1998","unstructured":"Provost, F., Fawcett, T., Kohavi, R.: The case against accuracy estimation for comparing induction algorithms. In: Proc. of the 15th International Conference on Machine Learning (ICML 1998). Morgan Kaufmann, San Mateo (1998)"},{"key":"29_CR22","unstructured":"Security Focus, Bugtraq (1998-2009), http:\/\/www.securityfocus.com"},{"key":"29_CR23","unstructured":"Kouns, J., Sullo, C., Martin, B., Shettler, D., Torino, S.: Open Source Vulnerability Data Base (2002-2009), http:\/\/osvdb.org"},{"key":"29_CR24","unstructured":"Salazar-Hern\u00e1ndez, R., D\u00edaz-Verdejo, J.: Generaci\u00f3n de tr\u00e1fico de ataque para la evaluaci\u00f3n de sistemas de detecci\u00f3n de intrusos. In: Actas de las VIII Jornadas de Ingenier\u00eda Telem\u00e1tica (JITEL 2009), pp. 439\u2013442 (2009)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T13:52:48Z","timestamp":1740750768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}