{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:39:54Z","timestamp":1743143994912,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":12,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_54","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"317-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Attack Classification Tool Based On Traffic Properties and Machine Learning"],"prefix":"10.1007","author":[{"given":"Victor Pasknel","family":"de Alencar Ribeiro","sequence":"first","affiliation":[]},{"given":"Raimir Holanda","family":"Filho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"54_CR1","unstructured":"S. M. Specht, \u201cDistributed Denial of Service: Taxonomies of attacks, tools and countermeasures\u201d, International conference on parallel and distributed computing systems, PP. 543\u2013550, September 2004."},{"key":"54_CR2","volume-title":"Analysis of Denial of Service Attack on TCP","author":"C. L. Schuba","year":"1997","unstructured":"C. L Schuba, I. V. Krsul, M. G. Kuhn, \u201cAnalysis of Denial of Service Attack on TCP\u201d, IEEE Computer Society, Washington, DC, USA, 1997."},{"key":"54_CR3","unstructured":"C. B. Lee, C. Roedel, E. Silenok, \u201cDetection and Characterization of Port Scan Attacks\u201d, Department of Computer Science & Engineering University of California, San Diego."},{"key":"54_CR4","unstructured":"A. W. Moore, D. Zuev, M. Crogan, \u201cDiscriminators for use in flow-based classification\u201d, In passive & Measurement workshop 2003 (PAM2005), August 2005."},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"P. Barford, J. Kline, D. Plonka, A. Ron, \u201cA signal analysis of network traffic anomalies\u201d, Internet Measurement Workshop 2002.","DOI":"10.1145\/637201.637210"},{"key":"54_CR6","unstructured":"Brutlag, J., \u201cAberrant behavior detection in timeseries for network monitoring\u201d, USENIX LISA 2000."},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"R. Holanda Filho, J. E. B. Maia, M. F. F. Carmo, , Paulino, G., \u201cAn Internet Traffic Classification Methodology based on Statistical Discriminators\u201d, In: IEEE\/IFIP Network Operations & Management Symposium, 2008, Salvador, Bahia. Anais do NOMS 2008, 2008.","DOI":"10.1109\/NOMS.2008.4575244"},{"key":"54_CR8","unstructured":"J. Kurose, K. Ross, Redes de computadores e a Internet: Uma abordagem top-down, Pearson Addison Wesley, 2006."},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"B. Pinkas, T. Sander, \u201cSecuring Passwords against dictionary attack\u201d, ACM conference on computer and communications security, pp. 161\u2013170, 2002.","DOI":"10.1145\/586110.586133"},{"key":"54_CR10","unstructured":"C. W. Kirkwood, \u201cDecision Tree primer\u201d, Department of Supply Chain Management, Arizona State University Tempe, AZ 85287\u20134706."},{"key":"54_CR11","unstructured":"Y. Wang, I. H. Witten, \u201cInduction of model trees for predicting continuous classes\u201d, Poster papers of the 9th European Conference on Machine Learning, 1997."},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"T. Kalganova, \u201cTowards the development of a Problem Solver for the Monitoring and Control of Instrumentation in a Grid Enviroment\u201d, School of Engineering and Design Brunel University, 2006.","DOI":"10.1109\/INES.2006.1689385"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T08:20:46Z","timestamp":1711182046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_54","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}