{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:26:32Z","timestamp":1725686792735},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642306327"},{"type":"electronic","value":"9783642306334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30633-4_13","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T03:25:28Z","timestamp":1338348328000},"page":"109-112","source":"Crossref","is-referenced-by-count":6,"title":["Real-Time and Resilient Intrusion Detection: A Flow-Based Approach"],"prefix":"10.1007","author":[{"given":"Rick","family":"Hofstede","sequence":"first","affiliation":[]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) (October 2004)","DOI":"10.17487\/rfc3954"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Sadasivan, G., Brownlee, N., Claise, B., Quittek, J.: Architecture for IP Flow Information Export. RFC 5470 (Informational) (March 2009)","DOI":"10.17487\/rfc5470"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Zseby, T., Boschi, E., Brownlee, N., Claise, B.: IP Flow Information Export (IPFIX) Applicability. RFC 5472 (Informational) (March 2009)","DOI":"10.17487\/rfc5472"},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A. Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys Tutorials\u00a012(3), 343\u2013356 (2010)","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Sperotto, A.: Flow-Based Intrusion Detection. PhD thesis, University of Twente (October 2010)","DOI":"10.1109\/INM.2011.5990529"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"M\u00fcnz, G., Carle, G.: Real-time Analysis of Flow Data for Network Attack Detection. In: Proceedings of the 10th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2007), pp. 100\u2013108 (2007)","DOI":"10.1109\/INM.2007.374774"},{"key":"13_CR7","unstructured":"Sadre, R., Sperotto, A., Pras, A.: The Effects of DDoS Attacks on Flow Monitoring Applications. In: Proceedings of the IEEE\/IFIP Network Operations and Management Symposium (NOMS 2012) (to appear, 2012)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Quittek, J., Bryant, S., Claise, B., Aitken, P., Meyer, J.: Information Model for IP Flow Information Export. RFC 5102 (Standards track) (January 2008)","DOI":"10.17487\/rfc5102"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Bartos, K., Rehak, M., Krmicek, V.: Optimizing Flow Sampling for Network Anomaly Detection. In: 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011), pp. 1304\u20131309 (2011)","DOI":"10.1109\/IWCMC.2011.5982728"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Duffield, N., Lund, C., Thorup, M.: Properties and Prediction of Flow Statistics from Sampled Packet Streams. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop, pp. 159\u2013171 (2002)","DOI":"10.1145\/637224.637225"},{"key":"13_CR11","unstructured":"SURFnet (2012), http:\/\/www.surfnet.nl\/en (accessed on March 29, 2012)"}],"container-title":["Lecture Notes in Computer Science","Dependable Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30633-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T12:42:39Z","timestamp":1642336959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30633-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642306327","9783642306334"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30633-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}