{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:43:00Z","timestamp":1725702180679},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_34","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"336-346","source":"Crossref","is-referenced-by-count":2,"title":["A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics"],"prefix":"10.1007","author":[{"given":"Aman","family":"Jantan","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Rasmi","sequence":"additional","affiliation":[]},{"given":"Mohd Izham","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Azri H. A.","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"CERT, CSO, and U.S.S. Service, 2011 CyberSecurity Watch Survey. Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte (2011)"},{"issue":"1-2","key":"34_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.diin.2010.02.003","volume":"7","author":"E.S. Pilli","year":"2010","unstructured":"Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: Survey and research challenges. Digital Investigation\u00a07(1-2), 14\u201327 (2010)","journal-title":"Digital Investigation"},{"key":"34_CR3","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research. Report from DFRWS 2001, F.D.F.R. Workshop Utica, New York, pp. 27\u201330 (2001)"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Almulhem, A.: Network forensics: Notions and challenges. In: 2009 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT (2009)","DOI":"10.1109\/ISSPIT.2009.5407485"},{"key":"34_CR5","unstructured":"Yasinsac, A., Manzano, Y.: Honeytraps, a network forensic tool. In: Proceedings of the Sixth Multi-Conference on Systemics, Florida, USA (2002)"},{"issue":"2","key":"34_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4156\/jnit.vol2.issue2.1","volume":"2","author":"Y.-D. Shin","year":"2011","unstructured":"Shin, Y.-D.: New Model for Cyber Crime Investigation Procedure. JNIT: Journal of Next Generation Information Technology\u00a02(2), 1\u20137 (2011)","journal-title":"JNIT: Journal of Next Generation Information Technology"},{"issue":"4","key":"34_CR7","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.diin.2005.11.007","volume":"2","author":"E. Casey","year":"2005","unstructured":"Casey, E.: Case study: Network intrusion investigation - lessons in forensic preparation. Digital Investigation\u00a02(4), 254\u2013260 (2005)","journal-title":"Digital Investigation"},{"issue":"23-24","key":"34_CR8","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1016\/S1389-1286(99)00114-0","volume":"31","author":"M.-Y. Huang","year":"1999","unstructured":"Huang, M.-Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks\u00a031(23-24), 2465\u20132475 (1999)","journal-title":"Computer Networks"},{"issue":"1","key":"34_CR9","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cose.2004.01.003","volume":"23","author":"M.K. Rogers","year":"2004","unstructured":"Rogers, M.K., Seigfried, K.: The future of computer forensics: a needs analysis survey. Computers & Security\u00a023(1), 12\u201316 (2004)","journal-title":"Computers & Security"},{"key":"34_CR10","volume-title":"Proceedings of the 20th International Conference Companion on World Wide Web","author":"G. Saptarshi","year":"2011","unstructured":"Saptarshi, G., Gautam, K., Niloy, G.: Spammers\u2019 networks within online social networks: a case-study on Twitter. In: Proceedings of the 20th International Conference Companion on World Wide Web. ACM, Hyderabad (2011)"},{"key":"34_CR11","unstructured":"Rasmi, M., Jantan, A.: A Model for NFAA-Network Forensics Attack Analysis. In: 3rd International Conference on Computer Engineering and Technology, ICCET 2011. ASME Press (2011)"},{"key":"34_CR12","volume-title":"Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications","author":"D. Kamal","year":"2011","unstructured":"Kamal, D., Bassil, M.: The anti-forensics challenge. In: Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications. ACM, Amman (2011)"},{"issue":"9","key":"34_CR13","doi-asserted-by":"publisher","first-page":"230","DOI":"10.4156\/jdcta.vol5.issue9.25","volume":"5","author":"M. Rasmi","year":"2011","unstructured":"Rasmi, M., Jantan, A.: AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study. International Journal of Digital Content Technology and its Applications\u00a05(9), 230\u2013237 (2011)","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"34_CR14","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-642-22191-0_35","volume-title":"Software Engineering and Computer Systems","author":"M. Rasmi","year":"2011","unstructured":"Rasmi, M., Jantan, A.: Attack Intention Analysis Model for Network Forensics. In: Zain, J.M., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds.) ICSECS 2011, Part II. CCIS, vol.\u00a0180, pp. 403\u2013411. Springer, Heidelberg (2011)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Peng, W., Yao, S., Chen, J.: Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis. In: International Conference on Multimedia Information Networking and Security, MINES 2009 (2009)","DOI":"10.1109\/MINES.2009.108"},{"key":"34_CR16","unstructured":"Qin, X., Lee, W.: Attack plan recognition and prediction using causal networks. In: 20th Annual Computer Security Applications Conference (2004)"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Z., Peng, W.: An Intrusive Intention Recognition Model Based on Network Security States Graph. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2009 (2009)","DOI":"10.1109\/WICOM.2009.5302778"},{"issue":"1","key":"34_CR18","first-page":"1","volume":"12","author":"W. Wei","year":"2008","unstructured":"Wei, W., Thomas, E.D.: A Graph Based Approach Toward Network Forensics Analysis. ACM Trans. Inf. Syst. Secur.\u00a012(1), 1\u201333 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"34_CR19","unstructured":"Wu, P., Zhigang, W., Junhua, C.: Research on Attack Intention Recognition Based on Graphical Model. In: Fifth International Conference on Information Assurance and Security, IAS 2009 (2009)"},{"issue":"3","key":"34_CR20","first-page":"244","volume":"3","author":"B. Zhu","year":"2006","unstructured":"Zhu, B., Ghorbani, A.A.: Alert Correlation For Extracting Attack Strategies. International Journal of Network Security\u00a03(3), 244\u2013258 (2006)","journal-title":"International Journal of Network Security"},{"key":"34_CR21","unstructured":"Peng, W., et al.: Recognizing Intrusive Intention Based on Dynamic Bayesian Networks. In: International Symposium on Information Engineering and Electronic Commerce, IEEC 2009 (2009)"},{"key":"34_CR22","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"RAID 2009","author":"D. Bolzoni","year":"2009","unstructured":"Bolzoni, D., Etalle, S., Hartel, P.H.: Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 1\u201320. Springer, Heidelberg (2009)"},{"key":"34_CR23","unstructured":"Wang, L., Li, Z.-T., Fan, J.: Learning attack strategies through attack sequence mining method. In: International Conference on Communication Technology, ICCT 2006 (2006)"},{"issue":"15","key":"34_CR24","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1016\/j.comcom.2006.04.001","volume":"29","author":"L. Wang","year":"2006","unstructured":"Wang, L., Liu, A., Jajodia, S.: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications\u00a029(15), 2917\u20132933 (2006)","journal-title":"Computer Communications"},{"key":"34_CR25","unstructured":"Wang, L., et al.: A novel algorithm SF for mining attack scenarios model. In: IEEE International Conference on e-Business Engineering, ICEBE 2006 (2006)"},{"issue":"1","key":"34_CR26","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10586-009-0096-9","volume":"13","author":"M. Nashat","year":"2010","unstructured":"Nashat, M., Maya, I.C., Ahmad, F.: Filtering intrusion detection alarms. Cluster Computing\u00a013(1), 19\u201329 (2010)","journal-title":"Cluster Computing"},{"key":"34_CR27","first-page":"171","volume-title":"Institute for Information Systems and Computer Media, IICM","author":"B. Zaka","year":"2009","unstructured":"Zaka, B.: Theory and Applications of Similarity Detection Techniques. In: Institute for Information Systems and Computer Media, IICM, p. 171. Graz University of Technology, Graz (2009)"},{"key":"34_CR28","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"N. Peng","year":"2003","unstructured":"Peng, N., Dingbang, X.: Learning attack strategies from intrusion alerts. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, Washington, D.C. (2003)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:52Z","timestamp":1620132352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}