{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:11:26Z","timestamp":1729609886683,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cnsm.2010.5691334","type":"proceedings-article","created":{"date-parts":[[2011,1,17]],"date-time":"2011-01-17T16:12:04Z","timestamp":1295280724000},"page":"56-63","source":"Crossref","is-referenced-by-count":9,"title":["RiskRank: Security risk ranking for IP flow records"],"prefix":"10.1109","author":[{"given":"Shaonan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ourdane","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.comnet.2008.05.004"},{"year":"2010","journal-title":"Emsisoft Portlist - All Known TCP and UDP Ports of Malware Trojans Spyware Viruses","key":"ref11"},{"year":"2004","author":"fokus","journal-title":"Requirements for IP flow information export","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1402958.1402970"},{"key":"ref14","first-page":"354","article-title":"System approach to intrusion detection using hidden markov model","author":"khanna","year":"2006","journal-title":"Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/324133.324140"},{"year":"2010","journal-title":"Massachusetts Institute of Technology Lincoln Laboratory Lincoln laboratory scenario (ddos) 1 0","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/11856214_7","article-title":"Ranking attack graphs","author":"mehta","year":"2006","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref18","article-title":"The pagerank citation ranking: Bringing order to the web","author":"page","year":"1998","journal-title":"Technical Report Stanford Digital Library Technologies Project"},{"year":"2010","journal-title":"The Honeynet Project Scan18","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/DNSR.2004.1344743"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/S0169-7552(98)00110-X"},{"year":"2009","author":"white","journal-title":"Hadoop The Definitive Guide","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1052934.1052938"},{"key":"ref6","article-title":"Automating network application dependency discovery: Experiences, limitations, and new solutions","author":"chen","year":"2008","journal-title":"Proceedings of OSDI"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/2.781636"},{"key":"ref8","first-page":"167","article-title":"Learning to probabilistically identify authoritative documents","author":"cohn","year":"2000","journal-title":"Workshop on Machine Learning"},{"key":"ref7","article-title":"RFC 5101 Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information","author":"claise","year":"2008","journal-title":"bep notaroo net"},{"key":"ref2","article-title":"Constellation: automated discovery of service and host dependencies in networked systems","author":"barham","year":"2008","journal-title":"TechReport MSR-TR-2008&#x2013;67"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"year":"2010","journal-title":"Argus Argus - auditing network activity","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/1135777.1135830"},{"key":"ref22","first-page":"45","article-title":"Automated worm fingerprinting","author":"singh","year":"2004","journal-title":"Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI)"},{"key":"ref21","first-page":"18","article-title":"Identifying critical attack assets in dependency attack gaphs","volume":"13","author":"sawilla","year":"2008","journal-title":"Proceedings of the 13th European Symposium on Research in Computer Security"},{"key":"ref24","first-page":"15","article-title":"Anomaly characterization in flowbased traffic time series","author":"sperotto","year":"0","journal-title":"IP Operations and Manaeement"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-642-04989-7_13","article-title":"Hidden markov model modeling of ssh brute-force attacks","author":"sperotto","year":"2009","journal-title":"Integrated Management of Systems Services Processes and People in IT"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/978-3-642-13986-4_20"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1815396.1815508"}],"event":{"name":"2010 International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2010,10,25]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2010,10,29]]}},"container-title":["2010 International Conference on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5668576\/5691186\/05691334.pdf?arnumber=5691334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T14:30:20Z","timestamp":1497882620000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5691334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2010.5691334","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}