{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:11Z","timestamp":1750307471475,"version":"3.41.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T00:00:00Z","timestamp":1295827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2011,1,24]]},"abstract":"<jats:p>Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks. Not only do we need to deal with the application-specific functionalities that are intricate, but we also have to handle the complex logic of coordinating the distribution and relocation of tasks. In this paper, we model an intrusion detection system that distributes its analysis units to a number of hosts and assigns fine-grained analysis tasks to these hosts in order to cope with the rapid increase of audit data from today's IT systems. The system is further capable to react to overload situations and to shift tasks to other hosts. To develop this complex system, we apply the model-based engineering method SPACE. In particular, we show that the collaborative specification style of the method can significantly reduce the development effort. Also, the formal semantics of SPACE ensures the correctness of important design properties.<\/jats:p>","DOI":"10.1145\/1921532.1921564","type":"journal-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:01Z","timestamp":1297171261000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling a distributed intrusion detection system using collaborative building blocks"],"prefix":"10.1145","volume":"36","author":[{"given":"Linda Ariani","family":"Gunawan","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Vogel","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology (BTU), Cottbus, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank Alexander","family":"Kraemer","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sebastian","family":"Schmerl","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology (BTU), Cottbus, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vidar","family":"Sl\u00e5tten","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Herrmann","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hartmut","family":"K\u00f6nig","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology (BTU), Cottbus, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2011,1,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/367211.367250"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/4434.678788"},{"key":"e_1_2_1_3_1","first-page":"15","article-title":"Network attack detection and defense -- manifesto of the dagstuhl perspective works","volume":"23","author":"Carle G.","year":"2009","unstructured":"Carle , G. , Dressler , F. , Kemmerer , R. , K\u00f6nig , H. , Kruegel , C. , and Laskov , P. ( 2009 ) Network attack detection and defense -- manifesto of the dagstuhl perspective works . Computer Science - R&D , 23 , 15 -- 25 . Carle, G., Dressler, F., Kemmerer, R., K\u00f6nig, H., Kruegel, C., and Laskov, P. (2009) Network attack detection and defense -- manifesto of the dagstuhl perspective works. Computer Science - R&D, 23, 15--25.","journal-title":"Computer Science - R&D"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_12"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253236"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.057"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04425-0_44"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13464-7_3"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT","volume":"7","author":"Kraemer F.","year":"2007","unstructured":"Kraemer , F. and Herrmann , P . ( 2007 ) Transforming collaborative service specifications into efficiently executable state machines . Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007), vol. 7 of Electronic Communications of the EASST, EASST. Kraemer, F. and Herrmann, P. (2007) Transforming collaborative service specifications into efficiently executable state machines. Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007), vol. 7 of Electronic Communications of the EASST, EASST."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/234528.234531"},{"key":"e_1_2_1_12_1","article-title":"Dynamic reconfiguration for middlewarebased applications","author":"Wegdam M.","year":"2003","unstructured":"Wegdam , M. , Almeida , J. , van Sinderen , M. , and Nieuwenhuis , L. ( 2003 ) Dynamic reconfiguration for middlewarebased applications . IEEE Transaction on Parallel and Distributed System, Special Issue on Middleware. Wegdam, M., Almeida, J., van Sinderen, M., and Nieuwenhuis, L. (2003) Dynamic reconfiguration for middlewarebased applications. IEEE Transaction on Parallel and Distributed System, Special Issue on Middleware.","journal-title":"IEEE Transaction on Parallel and Distributed System, Special Issue on Middleware."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176866.1176867"},{"key":"e_1_2_1_14_1","volume-title":"IEEE International Symposium on.","author":"Rasche A.","year":"2003","unstructured":"Rasche , A. and Polze , A . ( 2003 ) Configuration and dynamic reconfiguration of component-based applications with microsoft .net. Object-Oriented Real-Time Distributed Computing , IEEE International Symposium on. Rasche, A. and Polze, A. (2003) Configuration and dynamic reconfiguration of component-based applications with microsoft .net. Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on."},{"key":"e_1_2_1_15_1","volume-title":"An aspect-oriented framework for developing component-based software with the collaboration-based architectural style. Information and Software Technology, 46","author":"Lee J.","year":"2004","unstructured":"Lee , J. and Bae , D . ( 2004 ) An aspect-oriented framework for developing component-based software with the collaboration-based architectural style. Information and Software Technology, 46 . Lee, J. and Bae, D. (2004) An aspect-oriented framework for developing component-based software with the collaboration-based architectural style. Information and Software Technology, 46."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.2"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_18"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940084"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233391"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00089-X"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1921532.1921564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1921532.1921564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:42Z","timestamp":1750248522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1921532.1921564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,24]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,24]]}},"alternative-id":["10.1145\/1921532.1921564"],"URL":"https:\/\/doi.org\/10.1145\/1921532.1921564","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2011,1,24]]},"assertion":[{"value":"2011-01-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}