{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:53:26Z","timestamp":1743080006517,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642204197"},{"type":"electronic","value":"9783642204203"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-20420-3_9","type":"book-chapter","created":{"date-parts":[[2012,1,9]],"date-time":"2012-01-09T14:49:47Z","timestamp":1326120587000},"page":"175-201","source":"Crossref","is-referenced-by-count":1,"title":["Collaborative Attack Detection Using Distributed Hash Tables"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Esteves Verssimo","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Angori","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[]},{"given":"Mirco","family":"Marchetti","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Messori","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Esper: Event Processing for Java. Available online at http:\/\/www.espertech.com\/products\/esper.php"},{"key":"9_CR2","volume-title":"Proc. of the 23rd International Information Security Conference (SEC 2008)","author":"M. Colajanni","year":"2008","unstructured":"Colajanni, M., Gozzi, D., Marchetti, M.: Collaborative architecture for malware detection and analysis. In: Proc. of the 23rd International Information Security Conference (SEC 2008), Milan, Italy, Sep. 2008"},{"key":"9_CR3","volume-title":"Proc. of the IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware)","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Proc. of the IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, Nov. 2001"},{"key":"9_CR4","volume-title":"8th Workshop on Hot Topics in Operating Systems (HotOS VIII)","author":"P. Druschel","year":"2001","unstructured":"Druschel, P., Rowstron, A.: PAST: A\u00a0large-scale, persistent peer-to-peer storage utility. In: 8th Workshop on Hot Topics in Operating Systems (HotOS VIII), Schoss Elmau, Germany, May 2001"},{"key":"9_CR5","volume-title":"Proc. of the 18th ACM Symposium on Operating Systems Principles (SOSP\u201901)","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In: Proc. of the 18th ACM Symposium on Operating Systems Principles (SOSP\u201901), Chateau Lake Louise, Banff, Canada, May 2001"},{"key":"9_CR6","volume-title":"Proc. of the 3rd International Workshop on Networked Group Communication (NGC2001), UCL","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Kermarrec, A.M., Castro, M., Druschel, P.: SCRIBE: The design of a large-scale event notification infrastructure. In: Proc. of the 3rd International Workshop on Networked Group Communication (NGC2001), UCL, London, UK, Nov. 2001"},{"key":"9_CR7","volume-title":"Proc. of the Infocom\u201903","author":"M. Castro","year":"2003","unstructured":"Castro, M., Jones, M.B., Kermarrec, A.M., Rowstron, A., Theimer, M., Wang, H., Wolman, A.: An evaluation of scalable application-level multicast built using peer-to-peer overlays. In: Proc. of the Infocom\u201903, San Francisco, CA, USA, Apr. 2003"},{"key":"9_CR8","unstructured":"FreePastry library. Available online at http:\/\/www.freepastry.org\/FreePastry\/"},{"key":"9_CR9","volume-title":"Compcon Spring \u201991. Digest of Papers from the IEEE Computer Society Thirty-sixth International Conference","author":"S.R. Snapp","year":"1991","unstructured":"Snapp, S.R., Brentano, J., Dias, G.V., Goan, T.L., Grance, T., Heberlein, L.T., Ho, C.-L., Levitt, K.N., Mukherjee, B., Mansur, D.L., Pon, K.L., Smaha, S.E.: A\u00a0system for distributed intrusion detection. In: Compcon Spring \u201991. Digest of Papers from the IEEE Computer Society Thirty-sixth International Conference, San Francisco, CA, USA, Feb. 1991"},{"key":"9_CR10","isbn-type":"print","first-page":"211","volume-title":"Internet besieged: countering cyberspace scofflaws","author":"S.R. Snapp","year":"1998","unstructured":"Snapp, S.R., Brentano, J., Dias, G.V., Gihan, V., Goan, T.L., Terrance, L., Heberlein, L.T., Ho, C.-L., Levitt, K.N., Mukherjee, B., Smaha, S.E., Grance, T., Teal, D.M., Mansur, D.: DIDS (distributed intrusion detection system)\u2014motivation, architecture, and an early prototype. In: Internet besieged: countering cyberspace scofflaws, pp.\u00a0211\u2013227. ACM Press\/Addison-Wesley, New York (1998). ISBN:0-201-30820-7","ISBN":"https:\/\/id.crossref.org\/isbn\/0201308207"},{"key":"9_CR11","unstructured":"Kemmerer, R.A.: NSTAT: a\u00a0model-based real-time network intrusion detection system. Tech. report, University of California at Santa Barbara, Santa Barbara, CA, USA (1998)"},{"key":"9_CR12","volume-title":"IEEE Transactions on Software Engineering","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: a rule-based intrusion detection approach. In: IEEE Transactions on Software Engineering, IEEE Press, Piscataway (1995)"},{"key":"9_CR13","volume-title":"Proc. of the 1999 DoD-IRIS National Symposium on Sensor and Data Fusion (NSSDF)","author":"T. Bass","year":"1999","unstructured":"Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems. In: Proc. of the 1999 DoD-IRIS National Symposium on Sensor and Data Fusion (NSSDF), Laurel, MD, USA, May 1999"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Bass, T.: Intrusion detection systems and multisensor data fusion. Communication of the ACM 43(4) (2000)","DOI":"10.1145\/332051.332079"},{"key":"9_CR15","volume-title":"Proc. of the 2005 International Conference on Machine Learning and Cybernetics","author":"Y.-F. Zhang","year":"2005","unstructured":"Zhang, Y.-F., Xiong, Z.-Y., Wang, X.-Q.: Distributed intrusion detection based on clustering. In: Proc. of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, Apr. 2005"},{"key":"9_CR16","volume-title":"Proc. of the 19th Annual Computer Security Applications Conference","author":"Y.-S. Wu","year":"2003","unstructured":"Wu, Y.-S., Foo, B., Mei, Y., Bagchi, S.: Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS. In: Proc. of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA, Dec. 2003"},{"key":"9_CR17","volume-title":"Proc. of the Fifth World Congress on Intelligent Control and Automation (WCICA 2004)","author":"Y. Wang","year":"2004","unstructured":"Wang, Y., Yang, H., Wang, X., Zhang, R.: Distributed intrusion detection system based on data fusion method. In: Proc. of the Fifth World Congress on Intelligent Control and Automation (WCICA 2004), Hangzhou, China, Jun. 2004"},{"key":"9_CR18","unstructured":"Sourcefire\u00ae, Sourcefire Defense Center\u2122. http:\/\/www.sourcefire.com\/products\/3D\/defense_center"},{"key":"9_CR19","unstructured":"Top Layer Security\u00ae, SecureCommand\u2122IPS Centralized Management Solution. http:\/\/www.toplayer.com\/content\/products\/intrusion_detection\/index.jsp"},{"key":"9_CR20","unstructured":"Datamation\u00ae, Dragon IDS\/IPS: Distributed IDS\/IPS Platform with Multiple Detection Methods. http:\/\/products.datamation.com\/security\/id\/1192208840.html"},{"key":"9_CR21","unstructured":"Qbik\u00ae, NetPatrol. http:\/\/www.wingate.com\/products\/netpatrol\/features.php?fid=68"},{"key":"9_CR22","unstructured":"Prelude IDS technologies, Prelude IDS homepage. http:\/\/www.prelude-ids.org\/"},{"key":"9_CR23","volume-title":"Proc. of the 19th National Information Systems Security Conference","author":"S. Staniford-Chen","year":"1996","unstructured":"Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R., Zerkle, D.: GrIDS\u2014a graph-based intrusion detection system for large networks. In: Proc. of the 19th National Information Systems Security Conference, Baltimore, MD, USA, Oct. (1996)"},{"key":"9_CR24","volume-title":"Proc. of the IEEE International Conference on Systems, Man, and Cybernetics (SMC 2000)","author":"D. Ragsdale","year":"2000","unstructured":"Ragsdale, D., Carver, C., Humphries, J., Pooch, U.: Adaptation techniques for intrusion detection and intrusion response systems. In: Proc. of the IEEE International Conference on Systems, Man, and Cybernetics (SMC 2000), Nashville, TN, USA, Oct. 2000"},{"key":"9_CR25","volume-title":"Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001)","author":"H. Debar","year":"2001","unstructured":"Debar, H., Wespi, A.: Aggregation and correlation of intrusion-detection alerts. In: Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, USA, Oct. 2001"},{"key":"9_CR26","volume-title":"Proc. of 2001 WSES Conference on Neural Networks and Applications (NNA \u201901)","author":"Z. Zhang","year":"2001","unstructured":"Zhang, Z., Li, J., Manikopulos, C.N., Jorgenson, J., Ucles, J.: A\u00a0hierarchical anomaly network intrusion detection system using neural network classification. In: Proc. of 2001 WSES Conference on Neural Networks and Applications (NNA \u201901), Tenerife, Canary Islands, Feb. 2001"},{"key":"9_CR27","volume-title":"Proc. of the 2001 IEEE Workshop on Information Assurance and Security","author":"Z. Zhang","year":"2001","unstructured":"Zhang, Z., Li, J., Manikopulos, C.N., Jorgenson, J., Ucles, J.: HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In: Proc. of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY, USA, Jun. 2001"},{"key":"9_CR28","volume-title":"Proc. of the 14th Annual Computer Security Applications Conference (ACSAC 1998)","author":"J.S. Balasubramaniyan","year":"1998","unstructured":"Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E.H., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: Proc. of the 14th Annual Computer Security Applications Conference (ACSAC 1998). Scottsdale, AZ, USA, Dec. 1998"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.: The many faces of publish\/subscribe. ACM Comput. Surv. 35(2) (2003)","DOI":"10.1145\/857076.857078"}],"container-title":["Collaborative Financial Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20420-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T23:25:21Z","timestamp":1675207521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-20420-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642204197","9783642204203"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20420-3_9","relation":{},"subject":[],"published":{"date-parts":[[2012]]}}}