{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:44:03Z","timestamp":1725533043809},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024801"},{"type":"electronic","value":"9783642024818"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02481-8_75","type":"book-chapter","created":{"date-parts":[[2009,6,6]],"date-time":"2009-06-06T01:18:06Z","timestamp":1244251086000},"page":"515-522","source":"Crossref","is-referenced-by-count":15,"title":["Design of a Snort-Based Hybrid Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"J.","family":"G\u00f3mez","sequence":"first","affiliation":[]},{"given":"C.","family":"Gil","sequence":"additional","affiliation":[]},{"given":"N.","family":"Padilla","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ba\u00f1os","sequence":"additional","affiliation":[]},{"given":"C.","family":"Jim\u00e9nez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"75_CR1","unstructured":"Bace, R., Mell, P.: NIST Special Publication on Intrusion Detection Systems (2004), http:\/\/www.21cfrpart11.com\/files\/library\/reg_guid_docs\/nist_intrusiondetectionsys.pdf"},{"key":"75_CR2","doi-asserted-by":"crossref","unstructured":"Baker, A., Beale, J., Caswell, B., Poore, M.: Snort 2.1 Intrusion Detection, 2nd edn. (2004), http:\/\/www.snort.org\/","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"75_CR3","unstructured":"Ranum, M., Landfield, K., Stolarchuk, M., Sienkiewicz, M., Lambeth, A., Wall, E.: Implementing a generalized tool for network monitoring. In: Proceedings of the Eleventh Systems Administration Conference (LISA 1997), San Diego (1997)"},{"key":"75_CR4","unstructured":"Heberlein, L.T.: Network Security Monitor (NSM) - Final Report. Lawrence Livermore National Laboratory, Davis, CA (1995)"},{"key":"75_CR5","unstructured":"Lawrence Livermore National Laboratory: Network Intrusion Detector (NID) Overview. Computer Security Technology Center (1998)"},{"issue":"2","key":"75_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"75_CR7","unstructured":"Ye, N., Emran, S.M., Li, X., Chen, Q.: Statistical process control for computer intrusion detection. In: DARPA Information Survivability Conference & Exposition II, DISCEX 2001 (2001)"},{"key":"75_CR8","doi-asserted-by":"crossref","unstructured":"Barbara, D., Wu, N., Jajodia, S.: Detecting novel network intrusions using Bayes estimators. In: Proceedings of First SIAM Conference on Data Mining, Chicago, IL (2001)","DOI":"10.1137\/1.9781611972719.28"},{"issue":"6","key":"75_CR9","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1109\/TLA.2007.4395226","volume":"5","author":"J.E. D\u00edaz-Verdejo","year":"2007","unstructured":"D\u00edaz-Verdejo, J.E., Garc\u00eda-Teodoro, P., Mu\u00f1oz, P., Maci\u00e1-Fern\u00e1ndez, G., De Toro, F.: Una aproximaci\u00f3n basada en Snort para el desarrollo e implantaci\u00f3n de IDS h\u00edbridos (A Snort-based approach for the development and deployment of hybrid IDS). IEEE Latin America Transactions\u00a05(6), 386\u2013392 (2007)","journal-title":"IEEE Latin America Transactions"},{"issue":"1","key":"75_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TDSC.2007.9","volume":"4","author":"K. Hwang","year":"2007","unstructured":"Hwang, K., Cai, M., Chen, Y., Qin, M.: Hybrid Intrusion Detection with Weighted Signature Generation Over Anomalous Internet Episodes. IEEE Transactions on Dependable and Secure Computing\u00a04(1), 41\u201355 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"10","key":"75_CR11","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.jss.2006.12.546","volume":"80","author":"L.C. Wuu","year":"2007","unstructured":"Wuu, L.C., Hung, C.H., Chen, S.F.: Building intrusi\u00f3n pattern miner for Snort network intrusi\u00f3n detection system. Journal of Systems and Software\u00a080(10), 1699\u20131715 (2007)","journal-title":"Journal of Systems and Software"},{"key":"75_CR12","unstructured":"Ptacek, T.H., Newsham, T.N.: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Secure Networks, Inc. (1998)"},{"key":"75_CR13","unstructured":"Intrusion Detection Evaluation Data Sets. DARPA (2002), http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/index.html"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02481-8_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T18:28:00Z","timestamp":1558376880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02481-8_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024801","9783642024818"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02481-8_75","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}