{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T21:47:28Z","timestamp":1765057648593,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_26","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"336-347","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Probabilistic Real-Time Intrusion Detection System for Docker Containers"],"prefix":"10.1007","author":[{"given":"Siddharth","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"Akshay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Manik","family":"Mahajan","sequence":"additional","affiliation":[]},{"given":"Dinkar","family":"Sitaram","sequence":"additional","affiliation":[]},{"given":"Sanchika","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"3","key":"26_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1080\/19393555.2014.942017","volume":"23","author":"S Gupta","year":"2014","unstructured":"Gupta, S., Kumar, P.: System cum program-wide lightweight malicious program execution detection scheme for cloud. Inf. Secur. J. Global Perspect. 23(3), 86\u201399 (2014)","journal-title":"Inf. Secur. J. Global Perspect."},{"issue":"1","key":"26_CR2","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11277-014-2136-x","volume":"81","author":"S Gupta","year":"2015","unstructured":"Gupta, S., Kumar, P.: An immediate system call sequence-based approach for detecting malicious program executions in cloud environment. Wireless Pers. Commun. 81(1), 405\u2013425 (2015)","journal-title":"Wireless Pers. Commun."},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-24858-5_8","volume-title":"Security and Trust Management","author":"AS Abed","year":"2015","unstructured":"Abed, A.S., Clancy, C., Levy, D.S.: Intrusion detection system for applications using linux containers. In: Foresti, S. (ed.) STM 2015. LNCS, vol. 9331, pp. 123\u2013135. Springer, Cham (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-319-24858-5_8"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Koucham, O., Rachidi, T., Assem, N.: Host intrusion detection using system call argument-based clustering combined with Bayesian classification. In: 2015 SAI Intelligent Systems Conference (IntelliSys), London, pp. 1010\u20131016 (2015)","DOI":"10.1109\/IntelliSys.2015.7361267"},{"key":"26_CR5","unstructured":"Jurafsky, D., Martin, J.H.: \u201cLanguage Modeling with Ngrams\u201d Speech and Language Processing, Chap. 4 (2016)"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203\u2013222. Springer, Heidelberg (2004). \n                  https:\/\/doi.org\/10.1007\/978-3-540-30143-1_11"},{"key":"26_CR7","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-33386-1_21","volume-title":"Intelligent Systems and Applications","author":"T Rachidi","year":"2016","unstructured":"Rachidi, T., Koucham, O., Assem, N.: Combined data and execution flow host intrusion detection using machine learning. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) Intelligent Systems and Applications. SCI, vol. 650, pp. 427\u2013450. Springer, Cham (2016). \n                  https:\/\/doi.org\/10.1007\/978-3-319-33386-1_21"},{"key":"26_CR8","unstructured":"Assem, N., Rachidi, T., El Graini, M.T.: Intrusion detection using Bayesian classifier for arbitrarily long system call sequences. IADIS Int. J. Comput. Sci. Inf. Syst. 9, 71\u201381 (2014)"},{"key":"26_CR9","unstructured":"Computer Science Department, Farris Engineering Center. Computer Immune Systems Data Sets (1998) \n                  http:\/\/cs.unm.edu\/~immsec\/data\/synth-sm.html\n                  \n                . Accessed 21 Apr 2013"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A survey of intrusion detection systems for cloud computing environment. In: 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp. 1\u201313 (2016)","DOI":"10.1109\/ICEMIS.2016.7745295"},{"issue":"4","key":"26_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ifacol.2015.07.005","volume":"48","author":"Sukhanov A.V.","year":"2015","unstructured":"Sukhanov, A.V., Kovalev, S.M., St\u00fdskala, V.: Advanced temporal-difference learning for intrusion detection. IFAC-PapersOnLine 48, 43\u201348 (2015). \n                  https:\/\/doi.org\/10.1016\/j.ifacol.2015.07.005\n                  \n                . This work was supported by the Russian Foundation for Basic Research (Grants No. 13\u201307-00183 A, 13-08-12151 ofi_m_RZHD, 13-07-00226 A, 14-01-00259 A and 13-07-13109 ofi_m_RZHD) and partially supported by Grant of SGS No. SP2015\/151, V\u0160B - Technical University of Ostrava, Czech Republic","journal-title":"IFAC-PapersOnLine"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Hubballi, N., Biswas, S., Nandi, S.: Sequencegram: n-gram modeling of system calls for program-based anomaly detection. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011), Bangalore, pp. 1\u201310 (2011)","DOI":"10.1109\/COMSNETS.2011.5716416"},{"key":"26_CR13","unstructured":"Jurafsky, D., Martin, J.H.: Speech and Language Processing. Copyright \n                  \n                    \n                  \n                  $$ \\copyright $$\n                 14. All rights reserved. Draft of September 1, 2014 (2014)"},{"issue":"3","key":"26_CR14","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/09296179508590051","volume":"2","author":"WA Gale","year":"1995","unstructured":"Gale, W.A., Sampson, G.: Good-turing frequency estimation without tears. J. Quant. Linguist. 2(3), 217\u2013237 (1995)","journal-title":"J. Quant. Linguist."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:50:01Z","timestamp":1558396201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}