{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:10:42Z","timestamp":1729635042065,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802938","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"121-128","source":"Crossref","is-referenced-by-count":0,"title":["Adaptable exploit detection through scalable NetFlow analysis"],"prefix":"10.1109","author":[{"given":"Alan","family":"Herbert","sequence":"first","affiliation":[]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335069"},{"journal-title":"Softflowd Mindrot","year":"0","author":"miller","key":"ref32"},{"journal-title":"MemSQL Inc","year":"0","key":"ref31"},{"journal-title":"SQLite Consortium","year":"0","key":"ref30"},{"key":"ref10","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","volume":"5","author":"gu","year":"0"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/978-1-4419-5906-5_324","article-title":"Man-in-the-middle attack","author":"desmedt","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0092-2"},{"key":"ref13","first-page":"1","article-title":"The cost of lost data","volume":"6","author":"smith","year":"2003","journal-title":"Journal of Contemporary Business Practice"},{"key":"ref14","first-page":"7","author":"leslie","year":"2014","journal-title":"Legal Principles for Combatting Cyberlaundering"},{"journal-title":"Understanding Cryptography A Textbook for Students and Practitioners","year":"2009","author":"paar","key":"ref15"},{"journal-title":"W32\/Blaster worm CERT","year":"0","author":"chad","key":"ref16"},{"journal-title":"Microsoft (2009 April) Worm Win32\/Conficker E","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.59"},{"journal-title":"Microsoft (2003 July) Microsoft Security Bulletin MS03-026 - Critical Microsoft","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"ref28","first-page":"1","article-title":"A virtual honeypot framework","volume":"173","author":"provos","year":"0"},{"journal-title":"Network Flow Switching and Flow Data Export","year":"2001","author":"kerr","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"journal-title":"IPv4 Address Report","year":"0","author":"huston","key":"ref6"},{"article-title":"RFC 2460: Internet Protocol, version 6 (IPv6) specificat","year":"1998","author":"deering","key":"ref5"},{"journal-title":"Zeromq Messaging for Many Applications","year":"2013","author":"hintjens","key":"ref29"},{"journal-title":"NetFlow Packet Version 5 (V5) Cisco Systems Inc","year":"0","author":"huston","key":"ref8"},{"journal-title":"RFC 791 Internet Protocol &#x201D; IETF Tech Rep","year":"1981","author":"postel","key":"ref7"},{"journal-title":"Cisco","year":"0","key":"ref2"},{"key":"ref1","first-page":"177","article-title":"FPGA Based Implementation of a High Performance Scalable NetFlow Filter","author":"herbert","year":"0"},{"journal-title":"NetFlow Packet Version 8 (V8) Cisco Systems Inc","year":"0","key":"ref9"},{"journal-title":"Microsoft Security Bulletin MS03-039 - Critical Microsoft","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"journal-title":"Microsoft Security bulletin ms08-067 - critical","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref23","first-page":"149","article-title":"How to own the internet in your spare time","author":"staniford","year":"0"},{"journal-title":"Web Penetration Testing with Kali Linux","year":"2013","author":"muniz","key":"ref26"},{"key":"ref25","article-title":"Metasploit toolkit for penetration testing, exploit development, and vulnerability research","author":"maynor","year":"2011","journal-title":"Elsevier"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802938.pdf?arnumber=7802938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T12:18:39Z","timestamp":1658319519000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802938","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}