{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:08:02Z","timestamp":1748750882846,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_22","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"471-492","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection"],"prefix":"10.1007","author":[{"given":"Aleksandar","family":"Milenkoski","sequence":"first","affiliation":[]},{"given":"Bryan D.","family":"Payne","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Avritzer","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Luft","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"22_CR1","unstructured":"Rutkowska, J., Wojtczuk, R.: Xen Owning Trilogy: Part Two. http:\/\/invisiblethingslab.com\/resources\/bh08\/part2.pdf"},{"key":"22_CR2","unstructured":"Wilhelm, F., Luft, M., Rey, E.: Compromise-as-a-Service. https:\/\/www.ernw.de\/download\/ERNW_HITBAMS14_HyperV_fwilhelm_mluft_erey.pdf"},{"key":"22_CR3","unstructured":"Maiero, C., Miculan, M.: Unobservable intrusion detection based on call traces in paravirtualized systems. In: Proceedings of the International Conference on Security and Cryptography (2011)"},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1002\/sec.754","volume":"7","author":"JZ Wu","year":"2014","unstructured":"Wu, J.Z., Ding, L., Wu, Y., Min-Allah, N., Khan, S.U., Wang, Y.: $${\\rm C}^{\\text{2 }}$$ Detector: a covert channel detection framework in cloud computing. Secur. Commun. Netw. 7(3), 544\u2013557 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Milenkoski, A., Payne, B.D., Antunes, N., Vieira, M., Kounev, S.: Experience report: an analysis of hypercall handler vulnerabilities. In: Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering. IEEE (2014)","DOI":"10.1109\/ISSRE.2014.24"},{"key":"22_CR6","unstructured":"Le, C.H.: Protecting Xen Hypercalls. Master\u2019s thesis, UBC (2009)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Bharadwaja, S., Sun, W., Niamat, M., Shen, F.: A Xen hypervisor based collaborative intrusion detection system. In: Proceedings of the 8th International Conference on Information Technology, pp. 695\u2013700. IEEE (2011)","DOI":"10.1109\/ITNG.2011.123"},{"key":"22_CR8","unstructured":"Srivastava, A., Singh, K., Giffin, J.: Secure observation of kernel behavior (2008). http:\/\/hdl.handle.net\/1853\/25464"},{"key":"22_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-30436-1_12","volume-title":"Information Security and Privacy Research","author":"F Wang","year":"2012","unstructured":"Wang, F., Chen, P., Mao, B., Xie, L.: RandHyp: preventing attacks via Xen hypercall interface. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 138\u2013149. Springer, Heidelberg (2012)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Pham, C., Chen, D., Kalbarczyk, Z., Iyer, R.: CloudVal: a framework for validation of virtualization environment in cloud infrastructure. In: Proceedings of DSN 2011, pp. 189\u2013196 (2011)","DOI":"10.1109\/DSN.2011.5958218"},{"key":"22_CR11","unstructured":"Le, M., Gallagher, A., Tamir, Y.: Challenges and opportunities with fault injection in virtualized systems. In: VPACT (2008)"},{"issue":"5","key":"22_CR12","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TDSC.2013.45","volume":"11","author":"J Fonseca","year":"2014","unstructured":"Fonseca, J., Vieira, M., Madeira, H.: Evaluation of web security mechanisms using vulnerability and attack injection. IEEE Trans. Dependable Secure Comput. 11(5), 440\u2013453 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S Axelsson","year":"2000","unstructured":"Axelsson, S.: The base-rate fallacy and its implications for the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3(3), 186\u2013205 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255\u2013264 (2002)","DOI":"10.1145\/586143.586145"},{"key":"22_CR15","unstructured":"Burtsev, A.: Deterministic systems analysis. Ph.D. thesis, University of Utah (2013)"},{"key":"22_CR16","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for Unix processes. In: IEEE Symposium on Security and Privacy, pp. 120\u2013128, May 1996"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Gaffney, J.E., Ulvila, J.W.: Evaluation of intrusion detectors: a decision theory approach. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 50\u201361 (2001)","DOI":"10.1109\/SECPRI.2001.924287"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:26:11Z","timestamp":1748665571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"12 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}