{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:52:05Z","timestamp":1725882725166},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_57","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T03:13:59Z","timestamp":1489634039000},"page":"573-583","source":"Crossref","is-referenced-by-count":3,"title":["Snort Rule Detection for Countering in Network Attacks"],"prefix":"10.1007","author":[{"given":"Venkateswarlu","family":"Somu","sequence":"first","affiliation":[]},{"given":"D. B. K.","family":"Kamesh","sequence":"additional","affiliation":[]},{"given":"J. K. R.","family":"Sastry","sequence":"additional","affiliation":[]},{"given":"S. N. M.","family":"Sitara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Albin, N. Rowe, A realistic experimental comparison of the Suricata and Snort intrusion-detection systems, in: Enokido, T. (Ed.), Proc. 26th Int. Conf. Advanced Information Networking and Applications, WAINA\u201912. IEEE, Los Alamitos, CA, March 2012, pp. 122\u2013127.","DOI":"10.1109\/WAINA.2012.29"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Butun, S.D. Morgera, R. Sankar, A survey of intrusion detection systems in wireless sensor networks, Commun. Surv. Tutorials 16 (1) (2014) 266\u2013282.","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"A Collaborative Framework for Intrusion Detection in Mobile Networks\u201d by Mauro Andreolini, Michele Colajanni, Mirco Marchetti, proceedings in Information Sciences 321 (2015) 179\u2013192.","DOI":"10.1016\/j.ins.2015.03.025"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"T. Alpcan, C. Bauckhage, A.D. Schmidt, A probabilistic diffusion scheme for anomaly detection on smartphones, in: P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.), Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, Springer, Berlin, DE, 2010, pp. 31\u201346.","DOI":"10.1007\/978-3-642-12368-9_3"},{"key":"57_CR5","unstructured":"M. Colajanni, M. Marchetti, A parallel architecture for stateful intrusion detection in high traffic networks, in: G. Carle (Ed.), Proc. 1st Workshop on Monitoring, Attack Detection and Mitigation, MonAM\u201906, IEEE, Los Alamitos, CA, 2006, pp. 9\u201316."},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"M. Andreolini, S. Casolari, M. Colajanni, M. Marchetti, Dynamic load balancing for network intrusion detection systems based on distributed architectures, in: M. Wolf, F. Quaglia, D. Avresky (Eds.), Proc. 6th Int. Symp. Network Computing and Applications, NCA\u201907, IEEE, Los Alamitos, CA, 2007, pp. 153\u2013160.","DOI":"10.1109\/NCA.2007.17"},{"key":"57_CR7","doi-asserted-by":"crossref","unstructured":"M. Becher, F. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, C. Wolf, Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices, in: D. Frincke (Ed.), Proc. Int. Symp. Security and Privacy, SP\u201911, IEEE, Los Alamitos, CA, 2011, pp. 96\u2013111.","DOI":"10.1109\/SP.2011.29"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"L.D. Carli, R. Sommer, S. Jha, Beyond pattern matching: a concurrency model for stateful deep packet inspection, in: Proc. 21st Conf. Computer and Communications Security, SIGSAC\u201914, ACM, New York City, NY, 2014, pp. 1378\u20131390.","DOI":"10.1145\/2660267.2660361"},{"key":"57_CR9","doi-asserted-by":"crossref","unstructured":"M. Colajanni, D. Gozzi, M. Marchetti, Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems, in: R. Yavatkar, D. Grunwald, K. Ramakrishnan (Eds.), Proc. 3rd Int. Symp. Architectures for Networking and Communication Systems, ANCS\u201907, ACM, New York City, NY, 2007, pp. 165\u2013174.","DOI":"10.1145\/1323548.1323576"},{"key":"57_CR10","doi-asserted-by":"crossref","unstructured":"M. Colajanni, L.D. Zotto, M. Marchetti, M. Messori, Defeating NIDS evasion in mobile IPv6 networks, in: L. Bononi, A. Banchs (Eds.), Proc. 1st Int. Symp. World of Wireless Mobile and Multimedia Networks, WoWMoM\u201911, IEEE, Los Alamitos, CA, 2011, pp. 1\u20139.","DOI":"10.1109\/WoWMoM.2011.5986488"},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"M. Colajanni, L.D. Zotto, M. Marchetti, M. Messori, The problem of NIDS evasion in mobile networks, in: T.E. Ghazawi, L. Fratta (Eds.), Proc. 4th Int. Conf. New Technologies, Mobility and Security, NTMS\u201911, IEEE, Los Alamitos, CA, 2011, pp. 1\u20136.","DOI":"10.1109\/NTMS.2011.5721046"},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse, Towards energy-aware intrusion detection systems on mobile devices, in: Proc. 1st Int. Conf. High Performance Computing and Simulation, HPCS\u201913, IEEE, Los Alamitos, CA, 2013, pp. 289\u2013296.","DOI":"10.1109\/HPCSim.2013.6641428"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"P. Garcia-Teodoro, J.E. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput. Secur. 28 (1) (2009) 18\u201328.","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"57_CR14","unstructured":"L. Etienne, \\A short Snort rulesets analysis,\u201d tech. rep., CERN CERT, 2009."},{"key":"57_CR15","unstructured":"D. Bon_glio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, \\Revealing skype tra_c: when randomness plays"},{"key":"57_CR16","doi-asserted-by":"crossref","unstructured":"with you,\u201d SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 37{48, 2007.","DOI":"10.1145\/1282427.1282386"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"S. A. Baset and H. G. Schulzrinne, \\An analysis of the skype peer-to-peer internet telephony protocol,\u201d in INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1{11,2006.","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"E. Freire, A. Ziviani, and R. Salles, \\Detecting skype rows in web traffic,\u201d in Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, pp. 89{96, April 2008.","DOI":"10.1109\/NOMS.2008.4575121"},{"key":"57_CR19","unstructured":"F. D. P. Biondi, \\Silver Needle in the Skype.\u201d Black Hat Europe\u201906, Amsterdam, the Netherlands, Mar. 2006."},{"key":"57_CR20","unstructured":"D. B. Y. Kulbak, \\The eMule Protocol Specification.\u201d DANSS, Hebrew University of Jerusalem, Jan. 2005."},{"key":"57_CR21","unstructured":"Oinkmaster.\u201d http:\/\/oinkmaster.sourceforge.net , cited June 2009."},{"key":"57_CR22","unstructured":"Dumbpig-Automated checking for Snort rulesets.\u201d http:\/\/leonward.wordpress.com\/2009\/06\/07\/dumbpig-automated-checking-for-snort-rulesets\/ , cited July 2009."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T16:31:12Z","timestamp":1568910672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}