{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:29:14Z","timestamp":1716078554630},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,9,24]],"date-time":"2013-09-24T00:00:00Z","timestamp":1379980800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11227-013-1019-3","type":"journal-article","created":{"date-parts":[[2013,9,23]],"date-time":"2013-09-23T07:30:29Z","timestamp":1379921429000},"page":"585-613","source":"Crossref","is-referenced-by-count":17,"title":["SHAPE\u2014an approach for self-healing and self-protection in complex distributed networks"],"prefix":"10.1007","volume":"67","author":[{"given":"Inderpreet","family":"Chopra","sequence":"first","affiliation":[]},{"given":"Maninder","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,24]]},"reference":[{"key":"1019_CR1","doi-asserted-by":"crossref","unstructured":"Foster I, Kesselman C, Nick JM, Tuecke S (2004) The physiology of the grid. Global Grid Forum","DOI":"10.1002\/0470867167.ch8"},{"issue":"4","key":"1019_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"key":"1019_CR3","volume-title":"Congress on services part II, SERVICES-2","author":"W Sun","year":"2008","unstructured":"Sun W, Zhang X, Guo CJ, Sun P, Su H (2008) Software as a service: configuration and customization perspectives. In: Congress on services part II, SERVICES-2, 23\u201326 Sept. IEEE Press, New York"},{"key":"1019_CR4","volume-title":"IEEE grid computing environments GCE08","author":"I Foster","year":"2008","unstructured":"Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: IEEE grid computing environments GCE08"},{"key":"1019_CR5","first-page":"535","volume-title":"Computer and automation engineering (ICCAE)","author":"I Chopra","year":"2010","unstructured":"Chopra I, Singh M (2010) Analysing the need for autonomic behaviour in grid computing. In: Computer and automation engineering (ICCAE). IEEE Press, New York, pp 535\u2013539"},{"issue":"1","key":"1019_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1147\/sj.421.0005","volume":"42","author":"AG Ganek","year":"2003","unstructured":"Ganek AG, Corbi TA (2003) The dawning of the autonomic computing era. IBM Syst J 42(1):5\u201318","journal-title":"IBM Syst J"},{"key":"1019_CR7","series-title":"Computing","volume-title":"A survey on self-healing systems: approaches and systems","author":"H Psaier","year":"2011","unstructured":"Psaier H Dustdar S (2011) A survey on self-healing systems: approaches and systems. Computing. Springer, Berlin"},{"key":"1019_CR8","volume-title":"Self-healing systems\u2014survey and synthesis","author":"D Ghosh","year":"2006","unstructured":"Ghosh D, Sharman R, Raghav Rao H, Upadhyaya S (2006) Self-healing systems\u2014survey and synthesis. Elsevier, Amsterdam"},{"key":"1019_CR9","first-page":"247","volume-title":"Autonomic computing: an overview","author":"M Parashar","year":"2005","unstructured":"Parashar M, Hariri S (2005) Autonomic computing: an overview Springer, Berlin, pp 247\u2013259"},{"key":"1019_CR10","doi-asserted-by":"crossref","unstructured":"Garg R, Singh AK (2011) Fault tolerance in grid computing: state of art and open issues. Int J Comput Sci Eng Surv IJCSES","DOI":"10.5121\/ijcses.2011.2107"},{"key":"1019_CR11","volume-title":"Proceeding of the 7th international conference on autonomic computing, ICAC","author":"H Hoffmann","year":"2010","unstructured":"Hoffmann H, Eastep J et al (2010) Application heartbeats: a generic interface for specifying program performance and goals in autonomous computing environments. In: Proceeding of the 7th international conference on autonomic computing, ICAC. New York, NY, USA. ACM, New York, 7988 pp"},{"key":"1019_CR12","volume-title":"Proceeding of the 49th international conference on decision and control","author":"M Maggio","year":"2010","unstructured":"Maggio M, Hoffmann H, Leva A (2010) Controlling software applications via resource allocation within the heartbeats framework In: Proceeding of the 49th international conference on decision and control, Atlanta, USA. IEEE Press, New York"},{"key":"1019_CR13","unstructured":"Maggio M, Hoffmann H, Santambrogio MD, Agarwal A, Leva A (2011) A comparison of autonomic decision making techniques. Computer science and artificial intelligence laboratory technical report, MIT"},{"key":"1019_CR14","doi-asserted-by":"crossref","unstructured":"Amoon M (2011) A development of fault-tolerant and scheduling system for grid computing. GESJ, Comput Sci Telecommun","DOI":"10.1109\/ICNDC.2011.29"},{"key":"1019_CR15","first-page":"434","volume-title":"High performance computing and communications (HPCC)","author":"L Zhao","year":"2010","unstructured":"Zhao L, Ren Y, Xiang Y, Sakurai K (2010) Faulttolerant scheduling with dynamic number of replicas in heterogeneous systems. In: High performance computing and communications (HPCC), pp 434\u2013441"},{"key":"1019_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-49823-0_13","volume-title":"Self-protection for distributed component based applications","author":"B Claudel","year":"2006","unstructured":"Claudel B, De Palma N, Lachaize R, Hagimont D (2006) Self-protection for distributed component based applications. Springer, Berlin"},{"key":"1019_CR17","unstructured":"Networks A (2012) Arbor special report: worldwide infrastructure security report, vol VIII"},{"key":"1019_CR18","doi-asserted-by":"crossref","unstructured":"Varalakshmi P, Thamarai Selvi S (2013) Thwarting DDoS attacks in grid using information divergence. Future Gener Comput Syst","DOI":"10.1016\/j.future.2011.10.012"},{"key":"1019_CR19","series-title":"SEI series in software engineering","volume-title":"The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)","author":"D Cappelli","year":"2012","unstructured":"Cappelli D, Moore A, Trzeciak R (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). SEI series in software engineering. Addison\u2013Wesley, Reading, 28 pp"},{"key":"1019_CR20","unstructured":"Humphrey M, Thompson M (2002) Security implications of typical grid computing usage scenarios, cluster computing, vol 5, issue 3, July"},{"key":"1019_CR21","volume-title":"A database of computer attacks for the evaluation of intrusion detection systems","author":"K Kendall","year":"1999","unstructured":"Kendall K (1999) In: A database of computer attacks for the evaluation of intrusion detection systems, June"},{"key":"1019_CR22","unstructured":"McAfee (2006) Archived from the original on rootkits, part 1 of 3: the growing threat"},{"key":"1019_CR23","unstructured":"NMAP Homepage (1998) http:\/\/www.insecure.org\/nmap\/index.html"},{"key":"1019_CR24","volume-title":"Intrusion detection","author":"R Bace","year":"2000","unstructured":"Bace R (2000) Intrusion detection. Macmillan Technical Publishing, Indianapolis"},{"key":"1019_CR25","doi-asserted-by":"crossref","unstructured":"Baker A, Beale J, Caswell B, Poore M (2004) Snort 2.1 intrusion detection, 2nd edn. http:\/\/www.snort.org\/","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"1019_CR26","volume-title":"Proceedings of the 13th LISA conference of USENIX association","author":"M Roesch","year":"1999","unstructured":"Roesch M (1999) Snort\u2014lightweight intrusion detection for networks. In: Proceedings of the 13th LISA conference of USENIX association"},{"key":"1019_CR27","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","volume":"35","author":"M Ali Aydin","year":"2009","unstructured":"Ali Aydin M, Halim Zaim A, G\u00f6khan Ceylan K (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35:517\u2013526","journal-title":"Comput Electr Eng"},{"key":"1019_CR28","volume-title":"Proceedings of the eighth international conference on machine learning and cybernetics","author":"Y-X Ding","year":"2009","unstructured":"Ding Y-X, Xiao M, Liu A-W (2009) Research and implementation on snort-based hybrid intrusion detection system. In: Proceedings of the eighth international conference on machine learning and cybernetics, Baoding, 12\u201315 July. IEEE Press, New York. doi: 10.1109\/ICMLC.2009.5212282"},{"key":"1019_CR29","series-title":"LNCS","first-page":"515","volume-title":"IWANN 2009, part II","author":"J Gomez","year":"2009","unstructured":"Gomez J, Gil C, Padilla N, Banos R, Jimenez C (2009) Design of a snort-based hybrid intrusion detection system. In: IWANN 2009, part II. LNCS, vol 5518, pp 515\u2013522"},{"issue":"10","key":"1019_CR30","first-page":"18","volume":"47","author":"V Katkar","year":"2012","unstructured":"Katkar V, Bhirud SG (2012) Novel DoS\/DDoS attack detection and signature generation. Int J Comput Appl 47(10):18\u201324","journal-title":"Int J Comput Appl"},{"issue":"6","key":"1019_CR31","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TLA.2007.4395226","volume":"5","author":"JE Diaz-Verdejo","year":"2007","unstructured":"Diaz-Verdejo JE, Garcia-Teodoro P, Munoz P, Macia-Fernandez G (2007) A Snort-based approach for the development and deployment of hybrid IDS. IEEE Lat Am Trans 5(6):386\u2013392","journal-title":"IEEE Lat Am Trans"},{"issue":"1","key":"1019_CR32","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TDSC.2007.9","volume":"4","author":"K Hwang","year":"2007","unstructured":"Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Trans Dependable Secure Comput 4(1):41\u201355","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"10","key":"1019_CR33","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1016\/j.jss.2006.12.546","volume":"80","author":"LC Wuu","year":"2007","unstructured":"Wuu LC, Hung CH, Chen SF (2007) Building intrusion pattern miner for Snort network intrusion detection system. J Syst Softw 80(10):1699\u20131715","journal-title":"J Syst Softw"},{"key":"1019_CR34","volume-title":"SECRYPT 2011\u2014proceedings of the international conference on security and cryptography","author":"I Brahmi","year":"2011","unstructured":"Brahmi I, Yahia SB, Poncelet P (2011) A Snort-based mobile agent for a distributed intrusion detection system. In: SECRYPT 2011\u2014proceedings of the international conference on security and cryptography, Seville, Spain, 18\u201321 July"},{"key":"1019_CR35","volume-title":"Proceedings in international journal of artificial intelligence and computational research (IJAICR)","author":"GR Suryawanshi","year":"2010","unstructured":"Suryawanshi GR, Vanjale SB (2010) Mobile agent for distributed intrusion detection system in distributed system. In: Proceedings in international journal of artificial intelligence and computational research (IJAICR), June"},{"key":"1019_CR36","unstructured":"Exposito JA Ametller J Robles S (2010) Configuring the JADE HTTP MTP"},{"key":"1019_CR37","unstructured":"Zolnowski AP (2012) JADE-PKI 1.0 manual, 9 September"},{"key":"1019_CR38","unstructured":"Linux Kernel Mailing List (2006) Fixes for uli5261 (tulip driver), Aug. http:\/\/lkml.org\/lkml\/2006\/8\/19\/59"},{"key":"1019_CR39","doi-asserted-by":"crossref","unstructured":"Kadav A, Renzelmann MJ, Swift MM (2009) Tolerating hardware device failures in software, SOSP\u201909, 11\u201314 October","DOI":"10.1145\/1629575.1629582"},{"key":"1019_CR40","doi-asserted-by":"crossref","unstructured":"Maciej Szmit, Adamus S, Bugaa S, Szmit A (2012) Anomaly detection 3.0 for Snort. Snort.AD Project","DOI":"10.1155\/2012\/192913"},{"key":"1019_CR41","first-page":"144","volume-title":"5th annual ACM workshop on COLT","author":"BE Boser","year":"1992","unstructured":"Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: 5th annual ACM workshop on COLT. ACM Press, Pittsburgh, pp 144\u2013152"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1019-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-1019-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1019-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,18]],"date-time":"2024-05-18T01:56:19Z","timestamp":1715997379000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-1019-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,24]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["1019"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-1019-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,24]]}}}