{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:24:02Z","timestamp":1725564242000},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540205890"},{"type":"electronic","value":"9783540245803"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-24580-3_40","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:01:46Z","timestamp":1283727706000},"page":"341-354","source":"Crossref","is-referenced-by-count":3,"title":["Using CLIPS to Detect Network Intrusions"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Alipio","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Kumar, S.: Classification and Detection of Computer Intrusions. PhD thesis, Purdue, IN (1995)"},{"key":"40_CR2","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of LISA 1999: 13th Systems Administration Conference (1999)"},{"key":"40_CR3","unstructured":"Riley, G.: CLIPSAtool for building expert systems, \n \n http:\/\/www.ghg.net\/clips\/CLIPS.html"},{"key":"40_CR4","unstructured":"Sebring, M.M., Shellhouse, E., Hanna, M.E., Whitehurst, R.A.: Expert systems in intrusion detection: A case study. In: Proceedings of 11th National Computer Security Conference, Baltimore, Maryland, National Institute of Standards and Technology\/ National Computer Security Center, pp. 74\u201381 (1988)"},{"key":"40_CR5","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/RISP.1991.130799","volume-title":"Proceedings of the 1991 IEEE Symposium on Security and Privacy","author":"H.S. Javitz","year":"1991","unstructured":"Javitz, H.S., Valdes, A.: The SRI IDES statistical anomaly detector. In: Proceedings of the 1991 IEEE Symposium on Security and Privacy, Oakland, California, pp. 316\u2013326. IEEE Computer Society Press, Los Alamitos (1991)"},{"key":"40_CR6","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International (1995)"},{"key":"40_CR7","unstructured":"Lindqvist, U., Porras, P.A.: Detecting Computer and Network Misuse Through the Production- Based Expert System Toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California (1999)"},{"key":"40_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/BFb0013912","volume-title":"Computer Security - ESORICS 92","author":"N. Habra","year":"1992","unstructured":"Habra, N., Charlier, B.L., Mounji, A., Mathieu, I.: ASAX: Software Architecture and Rule- Based Language for Universal Audit Trail Analysis. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol.\u00a0648, pp. 435\u2013450. Springer, Heidelberg (1992)"},{"key":"40_CR9","unstructured":"Ilgun, K.: USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of the, IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 16\u201328 (1993)"},{"key":"40_CR10","unstructured":"Crosbie, M., Dole, B., Ellis, T., Krsul, I., Spafford, E.: IDIOT - User Guide. Technical report (September 1996)"},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/SECPRI.1989.36302","volume-title":"Proceedings of the 1989 IEEE Symposium on Security and Privacy","author":"H.S. Vaccaro","year":"1989","unstructured":"Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, California, pp. 280\u2013289. IEEE Computer Society Press, Los Alamitos (1989)"},{"key":"40_CR12","unstructured":"Jackson, K.A., DuBois, D.H., Stallings, C.A.: An expert system application for network intrusion detection. In: Proceedings of the 14th National Computer Society Conference, Washington, D.C., National Institute of Standards and Technology\/National Computer Society Center, pp. 215\u2013225 (1991)"},{"key":"40_CR13","unstructured":"Giarratano, J.C.: CLIPS User\u2019s Guide, Volume I - Basic Programming Guide (2002)"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Forgy, C.L.: OPS5 User\u2019s Manual. Technical Report CMU-CS-81-135, Carnegie Mellon University, Dept. of Computer Science (1981)","DOI":"10.21236\/ADA106558"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Forgy, C.: Rete:A Fast Algorithm for the Many Pattern\/Many Object Pattern Match Problem. Artificial Intelegence, 17\u201337 (1982)","DOI":"10.1016\/0004-3702(82)90020-0"},{"key":"40_CR16","unstructured":"Jacobson, V., Leres, C., McCanne, S.: tcpdump, \n \n http:\/\/www.tcpdump.org"},{"key":"40_CR17","unstructured":"McCanne, S., Jacobson, V.: The BSD Packet Filter: A New Architecture for User-Level Packet Capture. In: Proceedings of the 1993 Winter USENIX Conference, San Diego, CA (1993)"},{"key":"40_CR18","unstructured":"Roesch, M.: Snort Users Manual. Snort release: 1.9.x edn. (2002), \n \n http:\/\/www.snort.org"},{"key":"40_CR19","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R.S. Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Communications of the ACM\u00a020, 762\u2013772 (1977)","journal-title":"Communications of the ACM"},{"key":"40_CR20","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A. Aho","year":"1975","unstructured":"Aho, A., Corasick, M.: Efficient string matching: An aid to bibliographic search. Communications of the ACM\u00a018, 333\u2013343 (1975)","journal-title":"Communications of the ACM"},{"key":"40_CR21","unstructured":"Jason Coit, C., McAlerney, J., Staniford, S.: Towards Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II 2001), p. 367 (2001)"},{"key":"40_CR22","unstructured":"Curry, D., Debar, H.: Intrusion Detection Message Exchange Format, Data Model and Extensible Markup Language, XML (2002) (work in progress), \n \n http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-idwg-idmefxml-07.txt"},{"key":"40_CR23","unstructured":"Feinstein, B., Matthews, G., White, J.: The Intrusion Detection Exchange Protocol (IDXP) (2002) (work in progress), \n \n http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-idwg-beep-idxp-05.txt"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24580-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:36:06Z","timestamp":1558301766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24580-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540205890","9783540245803"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24580-3_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}