{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:47:00Z","timestamp":1725662820012},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642259746"},{"type":"electronic","value":"9783642259753"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25975-3_15","type":"book-chapter","created":{"date-parts":[[2012,2,24]],"date-time":"2012-02-24T08:44:15Z","timestamp":1330073055000},"page":"160-170","source":"Crossref","is-referenced-by-count":1,"title":["Online Internet Intrusion Detection Based on Flow Statistical Characteristics"],"prefix":"10.1007","author":[{"given":"Chengjie","family":"Gu","sequence":"first","affiliation":[]},{"given":"Shunyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hanhua","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1504\/IJSN.2010.037661","volume":"5","author":"T. Abbes","year":"2010","unstructured":"Abbes, T., Bouhoula, A., Rusinowitch, M.: Efficient decision tree for protocol analysis in intrusion detection. International Journal of Security and Networks\u00a05(4), 220\u2013235 (2010)","journal-title":"International Journal of Security and Networks"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cose.2009.07.008","volume":"29","author":"S. Georgios","year":"2010","unstructured":"Georgios, S., Sokratis, K.: Reducing false positives in intrusion detection systems. Computers and Security\u00a029(1), 35\u201344 (2010)","journal-title":"Computers and Security"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.4156\/aiss.vol2.issue4.10","volume":"2","author":"F.W. Karam","year":"2010","unstructured":"Karam, F.W., Jensen, T.: A Survey on QoS in Next Generation Networks. Advances in Information Sciences and Service Sciences\u00a02(4), 91\u2013102 (2010)","journal-title":"Advances in Information Sciences and Service Sciences"},{"issue":"6","key":"15_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.4156\/jdcta.vol4.issue6.12","volume":"4","author":"S. Boujelbene","year":"2010","unstructured":"Boujelbene, S., Mezghani, D., Ellouze, N.: Improving SVM by modifying kernel functions for speaker identification task. International Journal of Digital Content Technology and its Applications\u00a04(6), 100\u2013105 (2010)","journal-title":"International Journal of Digital Content Technology and its Applications"},{"issue":"1","key":"15_CR5","first-page":"70","volume":"4","author":"S. Janakiraman","year":"2009","unstructured":"Janakiraman, S., Vasudevan, V.: An intelligent distributed intrusion detection system using genetic algorithm. Journal of Convergence Information Technology\u00a04(1), 70\u201376 (2009)","journal-title":"Journal of Convergence Information Technology"},{"issue":"12","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1016\/j.comcom.2005.01.014","volume":"28","author":"Z. Zhang","year":"2005","unstructured":"Zhang, Z., Shen, H.: Application of online training SVMs for realtime intrusion detection with different considerations. Computer Communications\u00a028(12), 1428\u20131442 (2005)","journal-title":"Computer Communications"},{"issue":"1","key":"15_CR7","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S. Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C.: Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications\u00a030(1), 114\u2013132 (2007)","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.4156\/ijact.vol2.issue3.12","volume":"2","author":"O. Pal","year":"2010","unstructured":"Pal, O., Jain, P., Goyal, S.: Intrusion detection using graph support: a hybrid approach of supervised and unsupervised Techniques. International Journal of Advancements in Computing Technology\u00a02(3), 114\u2013118 (2010)","journal-title":"International Journal of Advancements in Computing Technology"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/09685221011079199","volume":"18","author":"P. Ahmed","year":"2010","unstructured":"Ahmed, P., Qais, Q., Christopher, W.: A survey of intrusion detection and prevention systems. Information Management and Computer Security\u00a018(4), 277\u2013290 (2010)","journal-title":"Information Management and Computer Security"},{"issue":"7","key":"15_CR10","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1016\/j.cose.2010.05.001","volume":"29","author":"G. Nitesh","year":"2010","unstructured":"Nitesh, G., Sotirios, Z.: Efficient hardware support for pattern matching in network intrusion detection. Computers and Security\u00a029(7), 756\u2013769 (2010)","journal-title":"Computers and Security"},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1504\/IJSN.2010.037660","volume":"5","author":"Z.. Zhuang","year":"2010","unstructured":"Zhuang, Z., Li, Y., Chen, Z.: Enhancing intrusion detection system with proximity information. International Journal of Security and Networks\u00a05(4), 207\u2013219 (2010)","journal-title":"International Journal of Security and Networks"},{"issue":"12","key":"15_CR12","doi-asserted-by":"publisher","first-page":"2375","DOI":"10.1016\/j.ins.2010.03.001","volume":"180","author":"P. Nam","year":"2010","unstructured":"Nam, P., Hyun, S., Won, L.: Anomaly intrusion detection by clustering transactional audit streams in a host computer. Information Sciences\u00a0180(12), 2375\u20132389 (2010)","journal-title":"Information Sciences"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1002\/sec.175","volume":"4","author":"S. Benfano","year":"2011","unstructured":"Benfano, S., Lucas, V., Ning, W.: Hybrid pattern matching for trusted intrusion detection. Security and Communication Networks\u00a04(1), 33\u201343 (2011)","journal-title":"Security and Communication Networks"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"C.. Zhou","year":"2010","unstructured":"Zhou, C., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers and Security\u00a029(1), 124\u2013140 (2010)","journal-title":"Computers and Security"},{"key":"15_CR15","unstructured":"Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"issue":"5","key":"15_CR16","first-page":"570","volume":"84","author":"M. Asaka","year":"2001","unstructured":"Asaka, M., Onabura, T., Inoue, S.: A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems\u00a084(5), 570\u2013577 (2001)","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"7","key":"15_CR17","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/S0167-4048(03)00710-7","volume":"22","author":"H. Sang","year":"2003","unstructured":"Sang, H., Won, S.: An anomaly intrusion detection method by clustering normal user behavior. Computers and Security\u00a022(7), 596\u2013612 (2003)","journal-title":"Computers and Security"},{"issue":"10","key":"15_CR18","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/j.comcom.2005.07.030","volume":"29","author":"J. Jing","year":"2006","unstructured":"Jing, J., Papavassiliou, S.: Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies. Computer Communications\u00a029(10), 1627\u20131638 (2006)","journal-title":"Computer Communications"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TR.2004.823851","volume":"53","author":"N. Ye","year":"2004","unstructured":"Ye, N., Zhang, Y., Borror, C.: Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability\u00a053(1), 116\u2013123 (2004)","journal-title":"IEEE Transactions on Reliability"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25975-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:12:17Z","timestamp":1556410337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25975-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642259746","9783642259753"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25975-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}