{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:59Z","timestamp":1750306979130,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Government of Russian Federation","award":["08-08"],"award-info":[{"award-number":["08-08"]}]},{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["16-29-09482, 18-07-01488"],"award-info":[{"award-number":["16-29-09482, 18-07-01488"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005442","name":"Budget Division","doi-asserted-by":"publisher","award":["????-?16-116033110102-5"],"award-info":[{"award-number":["????-?16-116033110102-5"]}],"id":[{"id":"10.13039\/100005442","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264488","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Branitskiy","sequence":"first","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St. Petersburg, Russia, St. Petersburg National Research University of Information Technologies, Mechanics and Optics, St. Petersburg, Russia"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St. Petersburg, Russia, St. Petersburg National Research University of Information Technologies, Mechanics and Optics, St. Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/950787.950965"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.24"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Fifth International Conference on Digital Society (ICDC), 187--192","author":"Day D.","year":"2011","unstructured":"D. Day , B. Burns . 2011 . A performance analysis of snort and suricata network intrusion detection and prevention engines . Proceedings of the Fifth International Conference on Digital Society (ICDC), 187--192 . D. Day, B. Burns. 2011. A performance analysis of snort and suricata network intrusion detection and prevention engines. Proceedings of the Fifth International Conference on Digital Society (ICDC), 187--192."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Conference on Electronic Commerce Research, 302--314","author":"Boyce A.P.","year":"2003","unstructured":"C. A.P. Boyce , A.N. Zincir-Heywood . 2003 . A Comparison of Four Intrusion Detection Systems for Secure E-Business . Proceedings of the International Conference on Electronic Commerce Research, 302--314 . C.A.P. Boyce, A.N. Zincir-Heywood. 2003. A Comparison of Four Intrusion Detection Systems for Secure E-Business. Proceedings of the International Conference on Electronic Commerce Research, 302--314."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2015616"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17512\/jamcm.2015.1.05"},{"key":"e_1_3_2_1_7_1","unstructured":"E. Albin. 2011. A comparative analysis of the snort and suricata intrusion detection systems. MA thesis Naval Postgraduate School Monterey CA.  E. Albin. 2011. A comparative analysis of the snort and suricata intrusion detection systems. MA thesis Naval Postgraduate School Monterey CA."},{"key":"e_1_3_2_1_8_1","unstructured":"M.A.C. Moya. 2008. Analysis and evaluation of the Snort and Bro network intrusion detection systems. Bachelor's Thesis. Universidad Pontificia Comillas.  M.A.C. Moya. 2008. Analysis and evaluation of the Snort and Bro network intrusion detection systems. Bachelor's Thesis. Universidad Pontificia Comillas."},{"volume-title":"Comparison of open source network intrusion detection systems","author":"R\u00f8dfoss J.T.","key":"e_1_3_2_1_9_1","unstructured":"J.T. R\u00f8dfoss . 2011. Comparison of open source network intrusion detection systems . University of Oslo , Department of Informatics. J.T. R\u00f8dfoss. 2011. Comparison of open source network intrusion detection systems. University of Oslo, Department of Informatics."},{"key":"e_1_3_2_1_10_1","unstructured":"Snort. https:\/\/www.snort.org\/.  Snort. https:\/\/www.snort.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Suricata. https:\/\/suricata-ids.org\/.  Suricata. https:\/\/suricata-ids.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Bro. https:\/\/www.bro.org\/.  Bro. https:\/\/www.bro.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"T.H. Ptacek T.N. Newsham. 1998. Insertion evasion and denial of service: Eluding network intrusion detection. SECURE NETWORKS INC CALGARY ALBERTA.  T.H. Ptacek T.N. Newsham. 1998. Insertion evasion and denial of service: Eluding network intrusion detection. SECURE NETWORKS INC CALGARY ALBERTA."},{"volume-title":"Network intrusion detection","author":"Northcutt S.","key":"e_1_3_2_1_14_1","unstructured":"S. Northcutt , J. Novak . 2002. Network intrusion detection . Sams Publishing . S. Northcutt, J. Novak. 2002. Network intrusion detection. Sams Publishing."},{"key":"e_1_3_2_1_15_1","unstructured":"SendIP. https:\/\/www-x.antd.nist.gov\/ipv6\/sendip.html.  SendIP. https:\/\/www-x.antd.nist.gov\/ipv6\/sendip.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Hping. http:\/\/www.hping.org\/.  Hping. http:\/\/www.hping.org\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Fragrouter. https:\/\/tools.kali.org\/information-gathering\/fragrouter.  Fragrouter. https:\/\/tools.kali.org\/information-gathering\/fragrouter."},{"key":"e_1_3_2_1_18_1","unstructured":"Fragroute. https:\/\/www.monkey.org\/~dugsong\/fragroute\/.  Fragroute. https:\/\/www.monkey.org\/~dugsong\/fragroute\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Y. Cheng J. Chu S. Radhakrishnan A. Jain. 2014. RFC 7413. TCP Fast Open. https:\/\/www.ietf.org\/rfc\/rfc7413.txt.  Y. Cheng J. Chu S. Radhakrishnan A. Jain. 2014. RFC 7413. TCP Fast Open. https:\/\/www.ietf.org\/rfc\/rfc7413.txt.","DOI":"10.17487\/rfc7413"},{"key":"e_1_3_2_1_20_1","unstructured":"OSSEC. https:\/\/www.ossec.net\/.  OSSEC. https:\/\/www.ossec.net\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Samhain. https:\/\/la-samhna.de\/samhain\/.  Samhain. https:\/\/la-samhna.de\/samhain\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"J. Postel. 1981. RFC 791. Internet protocol. https:\/\/www.ietf.org\/rfc\/rfc791.txt.  J. Postel. 1981. RFC 791. Internet protocol. https:\/\/www.ietf.org\/rfc\/rfc791.txt.","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1858"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3128"}],"event":{"name":"SIN '18: 11th International Conference On Security Of Information and Networks","sponsor":["Cardiff University Cardiff University"],"location":"Cardiff United Kingdom","acronym":"SIN '18"},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264488","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":24,"alternative-id":["10.1145\/3264437.3264488","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264488","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}