{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:58:26Z","timestamp":1725620306500},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540655978"},{"type":"electronic","value":"9783642601118"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-642-60111-8_15","type":"book-chapter","created":{"date-parts":[[2011,10,10]],"date-time":"2011-10-10T22:39:13Z","timestamp":1318286353000},"page":"158-169","source":"Crossref","is-referenced-by-count":0,"title":["Praktische Erfahrungen mit der Implementierung eines DNS-Protokoll-Intrusion-Detection-Systems"],"prefix":"10.1007","author":[{"given":"Markus","family":"Albrecht","sequence":"first","affiliation":[]},{"given":"Juan Altmayer","family":"Pizzorno","sequence":"additional","affiliation":[]},{"given":"Jens","family":"T\u00f6lle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"RFC","volume-title":"Domain Names - Concepts and Facilities","author":"P Mockapetris","year":"1987","unstructured":"P. Mockapetris: Domain Names - Concepts and Facilities, RFC 1034, November 1987."},{"key":"15_CR2","series-title":"RFC","volume-title":"Domain Names - Implementation and Specification","author":"P Mockapetris","year":"1987","unstructured":"P. Mockapetris: Domain Names - Implementation and Specification, RFC 1035, November 1987."},{"key":"15_CR3","unstructured":"Internet Software Consortium\u2019s home page for the BIND DNS implementation, on\n\n                    http:\/\/www.isc.org\/bind.html"},{"key":"15_CR4","volume-title":"The Design and Implementation of Tripwire: A File System Integrity Checker","author":"GH Kim","year":"1993","unstructured":"Gene H. Kim, Eugenen H. Spafford: The Design and Implementation of Tripwire: A File System Integrity Checker, Technical Report CSD-TR93- 071, Purdue University, 1993."},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K Ilgun","year":"1995","unstructured":"Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Transactions on Software Engineering, Volume 21, Number 3, pp. 181\u2013199, March 1995.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"15_CR6","first-page":"pp. 372","volume-title":"Model-Based Intrusion Detection","author":"TD Garvey","year":"1991","unstructured":"Thomas D. Garvey, Teresa F. Lunt: Model-Based Intrusion Detection, Proceedings of the 14th National Computer Security Conference, pp. 372- 385, October 1991."},{"key":"15_CR7","volume-title":"An Application of Pattern Matching in Intrusion Detection","author":"S Kumar","year":"1994","unstructured":"Sandeep Kumar, Eugene H. Spafford: An Application of Pattern Matching in Intrusion Detection, Technical Report CSD-TR94\u2013013, Purdue University, June 1994."},{"key":"15_CR8","volume-title":"Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-Based Approach","author":"CW Ko","year":"1996","unstructured":"Calvin W. Ko: Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-Based Approach, PhD Thesis, University of California, Davis, 1996."},{"key":"15_CR9","first-page":"2065","volume-title":"RFC","author":"D Eastlake","year":"1997","unstructured":"D. Eastlake, C. Kaufman: Domain Name System Security Extensions, RFC 2065, January 1997."},{"key":"15_CR10","unstructured":"The libpcap library is available from:\n\n                    ftp:\/\/ftp.ee.1bl.gov\/1ibpcap.tar.z"},{"key":"15_CR11","volume-title":"Protocol Intrusion Detection for the Internet Domain Name System","author":"Juan Altmayer Pizzomo","year":"1998","unstructured":"Juan Altmayer Pizzomo: Protocol Intrusion Detection for the Internet Domain Name System, Universit\u00e4t Bonn, 1998"},{"key":"15_CR12","unstructured":"http:\/\/apostols.org\/toolz\/"}],"container-title":["Informatik Aktuell","Kommunikation in Verteilten Systemen (KiVS)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-60111-8_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T07:22:39Z","timestamp":1620285759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-60111-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540655978","9783642601118"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-60111-8_15","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[1999]]}}}