{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:21:38Z","timestamp":1729664498374,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174912","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"7 pp.","source":"Crossref","is-referenced-by-count":0,"title":["Attack recognition for system survivability: a low-level approach"],"prefix":"10.1109","author":[{"given":"C.","family":"Taylor","sequence":"first","affiliation":[]},{"given":"J.","family":"Alves-Foss","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion Detection Using Sequences of System Calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"year":"2000","journal-title":"Hurwitz Group","article-title":"Hurwitz Report: Axent Technologies' NetProwler and Intruder Alert","key":"ref11"},{"year":"2002","journal-title":"Internet News","article-title":"U. S. Internet population continues to grow","key":"ref12"},{"year":"1997","author":"jacobson","journal-title":"tcpdump","key":"ref13"},{"year":"2002","author":"kent frederick","article-title":"Network intrusion detection signatures","key":"ref14"},{"key":"ref15","article-title":"Attack Recognition Based on Kernel Attack Signatures, In","author":"krings","year":"2001","journal-title":"Proceedings International Symp on Information Systems and Eng (ISE'2001)"},{"key":"ref16","article-title":"A two-layer approach to survivability of networked computer systems","author":"krings","year":"2001","journal-title":"Proceedings 2001 Int Conference on Advances in Infrastructure for Electronic Business Science and Education on the Internet (SSGRR 2001)"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICRE.1998.667804"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"ref19","article-title":"Experiences with Emerald to Date","author":"neumann","year":"1999","journal-title":"Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-1-5041-2919-0_28","article-title":"Intention Modeling: Approximating Computer User Intentions for Detection and Prediction of Intrusions","author":"spyrou","year":"1996","journal-title":"Information system security"},{"year":"2001","author":"cooper","article-title":"Intrusion Signatures and Analysis.","key":"ref4"},{"key":"ref27","article-title":"Automated Response Using System-Call Delays&#x201D;, In","author":"somayaji","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"},{"year":"2001","key":"ref3"},{"year":"1981","author":"ferguson","article-title":"Statistical Analysis in Psychology and Educatio,.","key":"ref6"},{"key":"ref29","article-title":"Low-Level network attack recognition: a signature-based approach","author":"taylor","year":"2001","journal-title":"Proceedings of 13th IASTED Int Conference on Parallel and Distributed Computing and Systems (PDCS 2001)"},{"key":"ref5","article-title":"An Approach to survivable systems","author":"ellison","year":"1999","journal-title":"NATO Symposium on Protecting Information Systems in the 21st Century"},{"year":"2000","journal-title":"Gridmark toast Packetstorm securify com\/DoS\/indexsize shmtl","key":"ref8"},{"year":"1999","journal-title":"Fyodor nmap","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45474-8_2","article-title":"Application-Integrated data collection for security Monitoring","author":"almgren","year":"2001","journal-title":"Proceedings of the 4th International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref9","article-title":"Asax: Software architecture and rule-based language for universal audit trail analysis","volume":"648","author":"habra","year":"1992","journal-title":"Proc 2nd European Symp on Res in Comp Sec (ESORICS)"},{"key":"ref1","article-title":"State of the practice Intrusion Detection Technologies","author":"allen","year":"2000","journal-title":"Carnegie Mellon SEI Tech Report CMU\/SEI-99-TR-028 ESC-99028"},{"year":"1998","author":"northcutt","article-title":"Shadow","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/S1389-1286(99)00112-7"},{"year":"1999","author":"northcutt","article-title":"Network Intrusion Detection: An Analysts Handbook","key":"ref21"},{"key":"ref24","article-title":"Implementing a Generalized Tool for Network Monitoring","author":"ranum","year":"1997","journal-title":"Proceedings of 11th Syst Admin Conf (LISA 97)"},{"key":"ref23","article-title":"Live traffic analysis of TCP\/IP gateways","author":"porras","year":"1998","journal-title":"Proceedings of the 1998 ISOC Symp on Network and Distirbuted Sys Sec"},{"key":"ref26","article-title":"A Specification-Based Approach for Building Survivable Systems","author":"sekar","year":"1998","journal-title":"Proceedings 21st National Information System Conference"},{"year":"0","author":"roesch","article-title":"Snort &#x2013;&#x2013; Lightweight Intrusions Detection for Networks","key":"ref25"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","start":{"date-parts":[[2003,1,9]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174912.pdf?arnumber=1174912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T14:07:09Z","timestamp":1585836429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174912","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}