{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:10:16Z","timestamp":1741345816503,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_69","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:01:51Z","timestamp":1311609711000},"page":"666-675","source":"Crossref","is-referenced-by-count":6,"title":["A Flow-Level Taxonomy and Prevalence of Brute Force Attacks"],"prefix":"10.1007","author":[{"given":"Jan","family":"Vykopal","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/EDCC.2006.17","volume-title":"EDCC 2006: Proceedings of the Sixth European Dependable Computing Conference","author":"E. Alata","year":"2006","unstructured":"Alata, E., Nicomette, V., Kaaniche, M., Dacier, M., Herrb, M.: Lessons learned from the deployment of a high-interaction honeypot. In: EDCC 2006: Proceedings of the Sixth European Dependable Computing Conference, pp. 39\u201346. IEEE Computer Society Press, Washington, DC, USA (2006)"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) (October 2004)","DOI":"10.17487\/rfc3954"},{"key":"69_CR3","unstructured":"Hewlett-Packard\u00a0Development Company. Top Cyber Security Risks Threat Report for (2010), http:\/\/dvlabs.tippingpoint.com\/toprisks2010"},{"key":"69_CR4","unstructured":"Dragon\u00a0Research Group. sshpwauth report (2010), http:\/\/www.dragonresearchgroup.org\/insight\/sshpwauth.txt"},{"key":"69_CR5","unstructured":"Haag, P.: NFDUMP - NetFlow processing tools (2009), http:\/\/nfdump.sourceforge.net\/"},{"key":"69_CR6","unstructured":"INVEA-TECH. Standard FlowMon Probe (2009), http:\/\/www.invea-tech.com\/"},{"key":"69_CR7","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A., Rivest, R.L.: Identification and Entity Authentication. In: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"2","key":"69_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. SIGCOMM Comput. Commun. Rev.\u00a034(2), 39\u201353 (2004)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"69_CR9","unstructured":"C.\u00a0Seifert. Analyzing Malicious SSH Login Attempts (2006), http:\/\/www.securityfocus.com\/infocus\/1876 (retrieved online January 3, 2010)"},{"issue":"3","key":"69_CR10","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A. Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-Based Intrusion Detection. Communications Surveys Tutorials\u00a012(3), 343\u2013356 (2010)","journal-title":"Communications Surveys Tutorials"},{"key":"69_CR11","doi-asserted-by":"crossref","unstructured":"Thames, J.L., Abler, R., Keeling, D.: A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks. In: IEEE Southeastcon 2008, pp. 84\u201389 (2008)","DOI":"10.1109\/SECON.2008.4494264"},{"key":"69_CR12","doi-asserted-by":"crossref","unstructured":"Trammell, B., Boschi, E.: Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC 5103 (Proposed Standard) (January 2008)","DOI":"10.17487\/rfc5103"},{"key":"69_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-29151-2","volume-title":"Similarity Search - The Metric Space Approach","author":"P. Zezula","year":"2006","unstructured":"Zezula, P., Amato, G., Dohnal, V., Batko, M.: Similarity Search - The Metric Space Approach, vol.\u00a032. Springer, Heidelberg (2006)"},{"key":"69_CR14","doi-asserted-by":"crossref","unstructured":"\u010celeda, P., Krej\u010d\u00ed, R.: Embedded Malware An Analysis of the Chuck Norris Botnet. In: To appear in European Conference on Computer Network Defense (EC2ND) (October 2010)","DOI":"10.1109\/EC2ND.2010.15"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T10:57:20Z","timestamp":1741345040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_69","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}