{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:24:35Z","timestamp":1725456275233},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/comswa.2006.1665205","type":"proceedings-article","created":{"date-parts":[[2006,8,8]],"date-time":"2006-08-08T18:44:03Z","timestamp":1155062643000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Modular Approach for Anomaly Based NIDS"],"prefix":"10.1109","author":[{"given":"S.","family":"Reddy","sequence":"first","affiliation":[]},{"given":"S.","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/90.944338"},{"year":"1999","author":"kendall","article-title":"A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems","key":"18"},{"year":"0","key":"15"},{"year":"1998","author":"ptacek","journal-title":"Insertion evasion and denial of service Eluding network intrusion detection","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/775094.775102"},{"key":"14","article-title":"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics","author":"handley","year":"2001","journal-title":"Proc Usenix Security Symposium"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/S1389-1286(99)00112-7"},{"year":"2008","author":"mahoney","article-title":"Learning Models of Network Traffic for Detecting Novel Attacks","key":"12"},{"year":"0","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1137\/1.9781611972719.28"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"10","article-title":"Snort - Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"Proc USENIX LISA"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/SECPRI.1996.502675"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/952589.952601"},{"year":"2004","author":"mahoney","article-title":"PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic","key":"5"},{"year":"0","journal-title":"Silicon Defense","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"8","article-title":"Utilizing Statistical Characteristics of N-grams for Intrusion Detection","author":"zhuowei","year":"2003","journal-title":"International Conference on Cyberworlds"}],"event":{"name":"2006 1st International Conference on Communication Systems Software & Middleware","location":"New Delhi, India"},"container-title":["2006 1st International Conference on Communication Systems Software &amp; Middleware"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11046\/34859\/01665205.pdf?arnumber=1665205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T12:37:40Z","timestamp":1489581460000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1665205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/comswa.2006.1665205","relation":{},"subject":[]}}