{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:42:07Z","timestamp":1725896527261},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319082"},{"type":"electronic","value":"9783642319099"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31909-9_3","type":"book-chapter","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T07:23:23Z","timestamp":1348298603000},"page":"39-58","source":"Crossref","is-referenced-by-count":1,"title":["Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems"],"prefix":"10.1007","author":[{"given":"Gaspar","family":"Modelo-Howard","sequence":"first","affiliation":[]},{"given":"Jevin","family":"Sweval","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Acohido, B.: Hackers breach Heartland Payment credit card system. USA Today (January 2009)"},{"key":"3_CR2","unstructured":"Addendum: Secure Configuration of Intrusion Detection Sensors, http:\/\/sites.google.com\/site\/securecomm11msa\/"},{"key":"3_CR3","unstructured":"Forum of Incident Response and Security Teams: Common Vulnerability Scoring System (CVSS), http:\/\/www.first.org\/cvss\/"},{"key":"3_CR4","unstructured":"Foo, B., Wu, Y., Mao, Y., Bagchi, S., Spafford, E.: ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. In: International Conference on Dependable Systems and Networks, pp. 508\u2013517. IEEE Computer Society (2005)"},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1456362.1456368","volume-title":"4th ACM Workshop on Quality of Protection","author":"M. Frigault","year":"2008","unstructured":"Frigault, M., Wang, L., Singhal, A., Jajodia, S.: Measuring network security using dynamic bayesian network. In: 4th ACM Workshop on Quality of Protection, pp. 23\u201330. ACM, New York (2008)"},{"key":"3_CR6","unstructured":"Kreibich, C., Sommer, R.: Policy-controlled Event Management for Distributed Intrusion Detection. In: 4th Int. Workshop on Distributed Event Based Systems (2005)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-540-87403-4_15","volume-title":"Recent Advances in Intrusion Detection","author":"G. Modelo-Howard","year":"2008","unstructured":"Modelo-Howard, G., Bagchi, S., Lebanon, G.: Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 271\u2013290. Springer, Heidelberg (2008)"},{"key":"3_CR8","unstructured":"Modelo-Howard, G., Bagchi, S., Lebanon, G.: Approximation Algorithms for Determining Placement of Intrusion Detectors. CERIAS Tech. Report 2011-01 (2011)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/CSAC.2004.11","volume-title":"20th Annual Computer Security Applications Conference","author":"S. Noel","year":"2004","unstructured":"Noel, S., Robertson, E., Jajodia, S.: Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. In: 20th Annual Computer Security Applications Conference, pp. 350\u2013359. IEEE Computer Society, New York (2004)"},{"key":"3_CR10","unstructured":"Nowicka, E., Zawada, M.: Modeling Temporal Properties of Multi-event Attack Signatures in Interval Temporal Logic. In: IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation (2006)"},{"key":"3_CR11","first-page":"245","volume-title":"9th ACM Conf. Computer and Communications Security","author":"P. Ning","year":"2002","unstructured":"Ning, P., Cui, Y., Reeves, D.: Constructing attack scenarios through correlation of intrusion alerts. In: 9th ACM Conf. Computer and Communications Security, pp. 245\u2013254. ACM Press, New York (2002)"},{"key":"3_CR12","first-page":"200","volume-title":"10th ACM Conf. Computer and Communications Security","author":"P. Ning","year":"2003","unstructured":"Ning, P., Xu, D.: Learning attack strategies from intrusion alerts. In: 10th ACM Conf. Computer and Communications Security, pp. 200\u2013209. ACM Press, New York (2003)"},{"key":"3_CR13","unstructured":"Ning, P., Xu, D., Healey, C., St. Amant, R.: Building Attack Scenarios through Integration of Complementary Alert Correlation Method. In: Network and Distributed System Security Symposium (2004)"},{"key":"3_CR14","unstructured":"OpenVAS. The Open Vulnerability Assessment System, http:\/\/www.openvas.org"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. J. Comp. Net.\u00a031, 2435\u20132463 (1999)","journal-title":"J. Comp. Net."},{"volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","year":"1988","author":"J. Pearl","key":"3_CR16","unstructured":"Pearl, J.: Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann Publishers Inc., San Francisco (1988)"},{"key":"3_CR17","unstructured":"Porras, P., Neumann, P.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: 20th National Information Systems Security Conference, pp. 353\u2013365 (1997)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-45248-5_5","volume-title":"Recent Advances in Intrusion Detection","author":"X. Qin","year":"2003","unstructured":"Qin, X., Lee, W.: Statistical Causality Analysis of INFOSEC Alert Data. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 73\u201393. Springer, Heidelberg (2003)"},{"key":"3_CR19","unstructured":"Roesch, M.: Snort: Lightweight Intrusion Detection for Networks. In: 13th Conference on Systems Administration, pp. 229\u2013238. USENIX (1999)"},{"key":"3_CR20","unstructured":"Snapp, S., et al.: DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype. In: 14th National Computer Security Conferenc, pp. 167\u2013176 (1991)"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/S1389-1286(00)00136-5","volume":"34","author":"E. Spafford","year":"2000","unstructured":"Spafford, E., Zamboni, D.: Intrusion detection using autonomous agents. J. Comp. Net.\u00a034, 547\u2013570 (2000)","journal-title":"J. Comp. Net."},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"990","DOI":"10.1126\/science.182.4116.990","volume":"182","author":"J. Swets","year":"1973","unstructured":"Swets, J.: The Relative Operating Characteristic in Psychology. Science\u00a0182, 990\u20131000 (1973)","journal-title":"Science"},{"key":"3_CR23","unstructured":"U.S. Department of Commerce. National Vulnerability Database, http:\/\/nvd.nist.gov\/"},{"key":"3_CR24","unstructured":"U.S. Department of Health & Human Services: Health Information Privacy: Breaches Affecting 500 or More Individuals, http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/breachnotificationrule\/postedbreaches.html"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2001","unstructured":"Valdes, A., Skinner, K.: Probabilistic Alert Correlation. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 54\u201368. Springer, Heidelberg (2001)"},{"key":"3_CR26","first-page":"37","volume":"7","author":"G. Vigna","year":"1999","unstructured":"Vigna, G., Kemmerer, R.: NetSTAT: A Network-based Intrusion Detection System. J. Comp. Sec.\u00a07, 37\u201371 (1999)","journal-title":"J. Comp. Sec."},{"volume-title":"Information Assurance: Dependability and Security in Networked Systems","year":"2007","author":"J. Wing","key":"3_CR27","unstructured":"Wing, J.: Scenario graphs applied to network security. In: Qian, Y., Tipper, D., Krishnamurthy, P., Joshi, J. (eds.) Information Assurance: Dependability and Security in Networked Systems. Morgan Kaufmann, San Francisco (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31909-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T13:46:44Z","timestamp":1643464004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31909-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319082","9783642319099"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31909-9_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}