{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:35:36Z","timestamp":1729622136169,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icmlc.2011.6016716","type":"proceedings-article","created":{"date-parts":[[2011,9,21]],"date-time":"2011-09-21T20:16:22Z","timestamp":1316636182000},"page":"348-355","source":"Crossref","is-referenced-by-count":1,"title":["A distributional attack scenario monitoring system based on dynamic peer-to-peer overlay hierarchy"],"prefix":"10.1109","author":[{"given":"Chu-Jiang","family":"Nie","sequence":"first","affiliation":[]},{"given":"Dong-Guo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zheng-Qing","family":"Han","sequence":"additional","affiliation":[]},{"given":"Pu-Rui","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991517"},{"key":"ref11","article-title":"A Graph Based Approach Toward Network Forensics Analysis","author":"wang","year":"2009","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.012"},{"key":"ref13","article-title":"Snort &#x2013; lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"3th USENIX Systems Administration Conference (LISA '99)"},{"year":"2009","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004372"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586144"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0006-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042036"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45248-5_5","article-title":"Statistical causality analysis of infosec alert data","author":"qin","year":"2003","journal-title":"Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID 2003)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"ref6","article-title":"A Comprehensive Approach to Intrusion Detection Alert Correlation","volume":"1","author":"fredrik","year":"2004","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775101"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","article-title":"Probabilistic alert correlation","author":"valdes","year":"2001","journal-title":"Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001)"},{"year":"2010","key":"ref7"},{"key":"ref2","article-title":"Research on Network-Warning Model Based on Dynamic Peer-to-Peer Overlay Hierarchy","author":"xu","year":"2010","journal-title":"Journal of Computer research and development"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA431826","author":"lippmann","year":"2005","journal-title":"An annotated review of past papers on attack scenarios"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","article-title":"Practical automated detection of stealthy portscans","volume":"10","author":"staniford","year":"2002","journal-title":"Journal of Computer Security"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3233\/JCS-2002-101-204","article-title":"STATL: An Attack Language for State-based Intrusion Detection","volume":"10","author":"eckmann","year":"2002","journal-title":"Journal of Computer Security"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","article-title":"Aggregation and correlation of intrusion-detection alerts","author":"debar","year":"2001","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-36084-0_7","article-title":"M2D2: A formal data model for IDS alert correlation","author":"morin","year":"2002","journal-title":"Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)"}],"event":{"name":"2011 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2011,7,10]]},"location":"Guilin, China","end":{"date-parts":[[2011,7,13]]}},"container-title":["2011 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6009138\/6016663\/06016716.pdf?arnumber=6016716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T04:42:54Z","timestamp":1560660174000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6016716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2011.6016716","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}