{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:25:16Z","timestamp":1744086316202,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328077"},{"type":"electronic","value":"9783642328084"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32808-4_6","type":"book-chapter","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T19:11:33Z","timestamp":1346785893000},"page":"52-63","source":"Crossref","is-referenced-by-count":4,"title":["Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network"],"prefix":"10.1007","author":[{"given":"Zolt\u00e1n","family":"Czirkos","sequence":"first","affiliation":[]},{"given":"G\u00e1bor","family":"Hossz\u00fa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Snort \u2013 open-source intrusion detection system, http:\/\/www.snort.org\/"},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S. Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys (CSUR)\u00a036(4), 335\u2013371 (2004)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-39945-3_13","volume-title":"Recent Advances in Intrusion Detection","author":"F. Cuppens","year":"2000","unstructured":"Cuppens, F., Ortalo, R.: LAMBDA: A Language to Model a Database for Detection of Attacks. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 197\u2013216. Springer, Heidelberg (2000)"},{"key":"6_CR4","unstructured":"Czirkos, Z., Hossz\u00fa, G.: Peer-to-peer Based Intrusion Detection. Infocommunications Journal LXIV(I), 3\u201310 (2009)"},{"key":"6_CR5","unstructured":"Czirkos, Z., T\u00f3th, L.L., Hossz\u00fa, G., Kov\u00e1cs, F.: Novel Applications of the Peer-to-Peer Communication Methodology. Journal on Information Technologies and Communications E-1(1(5)), 59\u201370 (2009)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","volume-title":"Recent Advances in Intrusion Detection","author":"H. Debar","year":"2001","unstructured":"Debar, H., Wespi, A.: Aggregation and Correlation of Intrusion-Detection Alerts. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 85\u2013103. Springer, Heidelberg (2001)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Duffield, N., Haffner, P., Krishnamurthy, B., Ringberg, H.: Rule-based anomaly detection on ip flows. In: IEEE INFOCOM 2009, pp. 424\u2013432. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5061947"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: A Peer-to-peer Approach to Network Intrusion Detection and Prevention. In: Proceedings of Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2003, pp. 226\u2013231. IEEE (2003)","DOI":"10.1109\/ENABL.2003.1231412"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1145\/258533.258660","volume-title":"Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, STOC 1997","author":"D. Karger","year":"1997","unstructured":"Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., Lewin, D.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, STOC 1997, pp. 654\u2013663. ACM, New York (1997)"},{"key":"6_CR10","unstructured":"Kemmerer, R.: Nstat: A model-based real-time network intrusion detection system. University of California-Santa Barbara Technical Report TRCS97 18 (1997)"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2002.1012428","volume":"35","author":"R. Kemmerer","year":"2002","unstructured":"Kemmerer, R., Vigna, G.: Intrusion detection: a brief history and overview. Computer\u00a035(4), 27\u201330 (2002)","journal-title":"Computer"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/11558989_9","volume-title":"Peer-to-Peer Systems IV","author":"S. Krishnamurthy","year":"2005","unstructured":"Krishnamurthy, S., El-Ansary, S., Aurell, E., Haridi, S.: A Statistical Theory of Chord Under Churn. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol.\u00a03640, pp. 93\u2013103. Springer, Heidelberg (2005)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A Peer-to-peer Information System Based on the XOR Metric (2002)","DOI":"10.1007\/3-540-45748-8_5"},{"issue":"4","key":"6_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"D. Moore","year":"2003","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security & Privacy\u00a01(4), 33\u201339 (2003)","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review\u00a031(4), 149\u2013160 (2001)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Templeton, S., Levitt, K.: A requires\/provides model for computer attacks. In: Proceedings of the 2000 Workshop on New Security Paradigms, pp. 31\u201338. ACM (2001)","DOI":"10.1145\/366173.366187"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Valdes, A., Skinner, K.: Probabilistic Alert Correlation. In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, pp. 54\u201368 (October 2001)","DOI":"10.1007\/3-540-45474-8_4"},{"issue":"4","key":"6_CR18","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1108\/09685220710817815","volume":"15","author":"V. Vlachos","year":"2007","unstructured":"Vlachos, V., Spinellis, D.: A PRoactive Malware Identification System based on the Computer Hygiene Principles. Information Management and Computer Security\u00a015(4), 295\u2013312 (2007)","journal-title":"Information Management and Computer Security"},{"key":"6_CR19","unstructured":"Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the domino overlay system. In: Proceedings of NDSS (2004)"},{"key":"6_CR20","unstructured":"Zhou, C.V., Karunasekera, S., Leckie, C.: A Peer-to-Peer Collaborative Intrusion Detection System. In: 13th IEEE International Conference on Networks, vol.\u00a01, p. 6. IEEE (2006)"},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"C. Zhou","year":"2010","unstructured":"Zhou, C., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Security\u00a029(1), 124\u2013140 (2010)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32808-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:21:31Z","timestamp":1744060891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32808-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328077","9783642328084"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32808-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}