{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:49:42Z","timestamp":1744904982715,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Science Council and the Industrial Technology Research Institute of Taiwan"},{"name":"ZyXEL, Inc"},{"name":"D-Link Corporation"},{"DOI":"10.13039\/100004351","name":"Cisco Systems, Inc","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chung-Hwa Telecom"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/jsyst.2014.2301464","type":"journal-article","created":{"date-parts":[[2014,5,9]],"date-time":"2014-05-09T14:07:28Z","timestamp":1399644448000},"page":"520-531","source":"Crossref","is-referenced-by-count":11,"title":["PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces"],"prefix":"10.1109","volume":"10","author":[{"given":"Ying-Dar","family":"Lin","sequence":"first","affiliation":[]},{"given":"Po-Ching","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Sheng-Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"I-Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuan-Cheng","family":"Lai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672310"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519147"},{"journal-title":"Wireshark SampleCaptures","year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.29"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"journal-title":"Wireshark Developer's Guide","year":"2008","author":"lamping","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890128"},{"key":"ref34","first-page":"87","article-title":"Towards packet anonymization by automatically inferring sensitive application fields","author":"lin","year":"0","journal-title":"Proc ICACT"},{"key":"ref10","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"0","journal-title":"Proc 13th USENIX Conf System Admin LISA"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575130"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2009.21"},{"journal-title":"Tcpanon","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550306"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255113"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/863993.863994"},{"journal-title":"Pktanon","year":"0","key":"ref19"},{"journal-title":"DARPA Intrusion Detection Evaluation Data Sets","year":"0","key":"ref28"},{"journal-title":"CAIDA traces dataset","year":"0","key":"ref4"},{"key":"ref27","first-page":"262","article-title":"Results of the 1998 DARPA offline intrusion detection evaluation","author":"lippmann","year":"0","journal-title":"Proc RAID Int Symp"},{"journal-title":"Packetlife repository","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"ref29","first-page":"1","article-title":"Considerations and pitfalls for conducting intrusion detection research","author":"paxson","year":"0","journal-title":"Proc 4rth GI Int Conf DIMVA"},{"journal-title":"Tcpdpriv Program for Eliminating Confidential Information From Traces","year":"0","author":"minshall","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2013.6617434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460899"},{"journal-title":"PCAPR collaborative network forensics","year":"0","key":"ref2"},{"journal-title":"TraceWrangler","year":"0","key":"ref9"},{"key":"ref1","first-page":"57","article-title":"Large-scale collection and sanitization of network security data: Risks and challenges","author":"porras","year":"0","journal-title":"Proc Workshop NSPW"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163595"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"journal-title":"Block Cipher Modes of Operation","year":"0","key":"ref42"},{"journal-title":"The PCAPLib project in the SourceForge","year":"0","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.03.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5673077"},{"journal-title":"Harpoon Traffic Generator","year":"0","key":"ref26"},{"journal-title":"The PCAPLib framework","year":"0","key":"ref25"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/7482862\/06813604.pdf?arnumber=6813604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:30:51Z","timestamp":1641987051000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6813604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":42,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2014.2301464","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2016,6]]}}}