{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:52:10Z","timestamp":1725407530945},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/iscc.2007.4381564","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T16:55:20Z","timestamp":1194972920000},"page":"71-78","source":"Crossref","is-referenced-by-count":6,"title":["A Novelty-Driven Approach to Intrusion Alert Correlation Based on Distributed Hash Tables"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Hofmann","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Dedinski","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Sick","sequence":"additional","affiliation":[]},{"given":"Hermann","family":"de Meer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1380189"},{"key":"ref11","first-page":"27","article-title":"Distributed intrusion detection for computer systems using communicating agents","author":"ingram","year":"2000","journal-title":"Proceedings of the 2000 Command and Control Research and Technology Symposium"},{"key":"ref12","first-page":"226","article-title":"Indra: A peer-to-peerapproach to network intrusion detection and prevention","author":"janakiraman","year":"2003","journal-title":"Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies"},{"key":"ref13","article-title":"Applying mobile agents to intrusion detection and response","author":"jansen","year":"1999","journal-title":"Technical Report 6416"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162669"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888905000408"},{"key":"ref16","article-title":"Load balancing in structured p2p systems","author":"rao","year":"2003","journal-title":"Proceedings of the 2nd International Workshop onPeer-to-PeerSystems"},{"key":"ref17","first-page":"99","article-title":"Peer-to-peer architecture case study: Gnutella network","author":"ripeanu","year":"2001","journal-title":"Proceedings of the First InternationalConference on Peer-to-Peer Computing"},{"key":"ref18","first-page":"329","article-title":"Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware)"},{"key":"ref19","first-page":"674","article-title":"Distributed linear hashing and parallel projection in main memory databases","author":"severance","year":"1990","journal-title":"VLDB '90 Proceedings of the 16th InternationalConference on Very Large Data Bases"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"ref3","article-title":"Intrusion detection systems: A survey and taxonomy","author":"axelsson","year":"2000","journal-title":"Technical Report 99&#x2013;15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991518"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","article-title":"Freenet: a distributed anonymous information storage and retrieval system","author":"clarke","year":"2001","journal-title":"International Workshop on Designing Privacy Enhancing Technologies New York"},{"key":"ref8","first-page":"82","article-title":"Knowledge discovery and data mining: Towards a unifying framework","author":"fayyad","year":"1996","journal-title":"Proceedings of The Second InternationalConference on Knowledge Discovery and Data Mining"},{"key":"ref7","article-title":"The intrusion detection message exchange format","author":"debar","year":"2005","journal-title":"Internet-draft"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2002.1046310"},{"key":"ref9","first-page":"54","article-title":"A framework for distributed intrusion detection using interest driven cooperating agents","author":"gopalakrishna","year":"2001","journal-title":"Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection"},{"key":"ref1","article-title":"Intrusion detection systems: Perspective","author":"allen","year":"2003","journal-title":"Technical Report"},{"article-title":"Pattern recognition","year":"1998","author":"teodiridis","key":"ref20"},{"key":"ref22","article-title":"A survey of distributed intrusion detection approaches","author":"treaster","year":"2005","journal-title":"Technical Report CR\/0501001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"article-title":"Intrusion Detection: Modeling System State to Detect and Classify Anomalous Behaviors","year":"2004","author":"undercoffer","key":"ref23"},{"key":"ref26","article-title":"Global intrusion detection in the DOMINO overlay system","author":"yegneswaran","year":"2004","journal-title":"11th Annual Network and Distributed Security Symposium"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/65.484228"}],"event":{"name":"2007 IEEE Symposium on Computers and Communications","start":{"date-parts":[[2007,7,1]]},"location":"Santiago, Portugal","end":{"date-parts":[[2007,7,4]]}},"container-title":["2007 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4381469\/4381470\/04381564.pdf?arnumber=4381564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T20:35:44Z","timestamp":1497731744000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4381564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iscc.2007.4381564","relation":{},"ISSN":["1530-1346"],"issn-type":[{"type":"print","value":"1530-1346"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}