{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:02:48Z","timestamp":1743040968311,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642204197"},{"type":"electronic","value":"9783642204203"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-20420-3_8","type":"book-chapter","created":{"date-parts":[[2012,1,9]],"date-time":"2012-01-09T14:49:47Z","timestamp":1326120587000},"page":"157-174","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Attack Detection Using Agilis"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Esteves Verssimo","sequence":"first","affiliation":[]},{"given":"Leonardo","family":"Aniello","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Baldoni","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Chockler","sequence":"additional","affiliation":[]},{"given":"Gennady","family":"Laventman","sequence":"additional","affiliation":[]},{"given":"Giorgia","family":"Lodi","sequence":"additional","affiliation":[]},{"given":"Ymir","family":"Vigfusson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"2000 DARPA intrusion detection scenario specific data sets. http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/2000data.html"},{"key":"8_CR2","unstructured":"Hadoop. http:\/\/hadoop.apache.org\/"},{"key":"8_CR3","unstructured":"ITOC Research CDX Datasets. http:\/\/www.itoc.usma.edu\/research\/dataset\/index.html"},{"key":"8_CR4","unstructured":"Jaql. http:\/\/www.jaql.org\/"},{"key":"8_CR5","unstructured":"JavaScript Object Notation (JSON). http:\/\/www.json.org\/"},{"key":"8_CR6","unstructured":"DShield: Cooperative Network Security Community\u2014Internet Security. http:\/\/www.dshield.org\/indexd.html\/ (2009)"},{"key":"8_CR7","unstructured":"Hadoop-HDFS architecture. http:\/\/hadoop.apache.org\/common\/docs\/current\/hdfs_design.html (2009)"},{"key":"8_CR8","unstructured":"IBM WebSphere eXtreme scale. http:\/\/www-01.ibm.com\/software\/webservers\/appserv\/extremescale\/ (2009)"},{"key":"8_CR9","unstructured":"Where complex event processing meets open source: Esper and NEsper. http:\/\/esper.codehaus.org\/ (2011)"},{"key":"8_CR10","unstructured":"WANem the wide area network emulator. http:\/\/wanem.sourceforge.net\/ (2011)"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/ICDCS.2006.13","volume-title":"ICDCS\u201906: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems","author":"L. Amini","year":"2006","unstructured":"Amini, L., Jain, N., Sehgal, A., Silber, J., Verscheure, O.: Adaptive control of extreme-scale stream processing systems. In: ICDCS\u201906: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, p.\u00a071. IEEE Computer Society, Washington (2006)"},{"key":"8_CR12","volume-title":"Proc. of Workshop on Hot Topics in Understanding Botnets","author":"N. Daswani","year":"2007","unstructured":"Daswani, N., Stoppelman, M.: The anatomy of Clickbot.A. In: Proc. of Workshop on Hot Topics in Understanding Botnets, Berkeley, CA, USA (2007). USENIX Association"},{"key":"8_CR13","series-title":"WWW\u201907","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/1242572.1242661","volume-title":"Proceedings of the 16th International Conference on World Wide Web","author":"D.A.F. Flor\u00eancio","year":"2007","unstructured":"Flor\u00eancio, D.A.F., Herley, C.: A\u00a0large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, WWW\u201907, Banff, Alberta, Canada, pp.\u00a0657\u2013666. ACM, New York (2007)"},{"key":"8_CR14","unstructured":"Goodin, D.: Server-based botnet floods net with brutish SSH attacks. http:\/\/www.theregister.co.uk\/2010\/08\/12\/server_based_botnet\/ (accessed on 01\/24\/11) (2010)"},{"key":"8_CR15","volume-title":"Five Arrested in Scam Involving Theft via Botnet","author":"G. Gross","year":"2010","unstructured":"Gross, G., McMillian, R.: Five Arrested in Scam Involving Theft via Botnet, vol.\u00a010 (2010)"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"D. Jeffrey","year":"2008","unstructured":"Jeffrey, D., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"8_CR17","first-page":"3","volume-title":"Proc. of ACM CCS\u201908","author":"C. Kanich","year":"2008","unstructured":"Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proc. of ACM CCS\u201908, pp.\u00a03\u201314. ACM, New York (2008)"},{"key":"8_CR18","unstructured":"Jin, T., Arlitt, M.: 1998 World Cup Web Site Access Logs, August (1998)"},{"key":"8_CR19","unstructured":"DefenseIntelligence Matt\u00a0Thompson. Mariposa Botnet Analysis, October 2009. Updated February (2010)"},{"key":"8_CR20","unstructured":"Microsoft. Battling Botnets for Control of Computers. Microsoft: Security Intelligence Report 9 (2010)"},{"key":"8_CR21","first-page":"52","volume":"7","author":"J.E. Weber","year":"2006","unstructured":"Weber, J.E., Paulson, R.A.: Cyberextortion: an overview of distributed denial of service attacks against online gaming companies. Issues Inf. Syst. 7, 52\u201356 (2006)","journal-title":"Issues Inf. Syst."}],"container-title":["Collaborative Financial Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20420-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T02:51:16Z","timestamp":1674183076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-20420-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642204197","9783642204203"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20420-3_8","relation":{},"subject":[],"published":{"date-parts":[[2012]]}}}