{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:19:24Z","timestamp":1725797964000},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662442074"},{"type":"electronic","value":"9783662442081"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44208-1_23","type":"book-chapter","created":{"date-parts":[[2014,7,25]],"date-time":"2014-07-25T00:13:10Z","timestamp":1406247190000},"page":"280-292","source":"Crossref","is-referenced-by-count":0,"title":["Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time"],"prefix":"10.1007","author":[{"given":"Renier","family":"van Heerden","sequence":"first","affiliation":[]},{"given":"Mercia M.","family":"Malan","sequence":"additional","affiliation":[]},{"given":"Francois","family":"Mouton","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-33332-3_21","volume-title":"ICT Critical Infrastructures and Society","author":"R. Heerden van","year":"2012","unstructured":"van Heerden, R., Pieterse, H., Irwin, B.: Mapping the most significant computer hacking events to a temporal computer attack model. In: Hercheui, M.D., Whitehouse, D., McIver Jr., W., Phahlamohlaka, J. (eds.) ICT Critical Infrastructures and Society. IFIP AICT, vol.\u00a0386, pp. 226\u2013236. Springer, Heidelberg (2012)"},{"unstructured":"van Heerden, R.P., Burke, I., Irwin, B.: Classifying network attack scenarios using an ontology. In: Proceedings of the 7th International Conference on Information-Warfare & Security (ICIW 2012), pp. 311\u2013324. ACI (2012)","key":"23_CR2"},{"doi-asserted-by":"crossref","unstructured":"Joyal, P.: Industrial espionage today and information wars of tomorrow. In: 19th National Information Systems Security Conference, pp. 139\u2013151 (1996)","key":"23_CR3","DOI":"10.1117\/12.234727"},{"key":"23_CR4","first-page":"933","volume":"41","author":"A. Burstein","year":"2009","unstructured":"Burstein, A.: Trade secrecy as an instrument of national security\u2013rethinking the foundations of economic espionage. Arizona State Law Journal\u00a041, 933\u20131167 (2009)","journal-title":"Arizona State Law Journal"},{"doi-asserted-by":"crossref","unstructured":"Grant, T., Venter, H., Eloff, J.: Simulating adversarial interactions between intruders and system administrators using ooda-rr. In: Proceedings of the 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 46\u201355. ACM (2007)","key":"23_CR5","DOI":"10.1145\/1292491.1292497"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.4018\/ijcwt.2012070102","volume":"3","author":"R. Heerden van","year":"2012","unstructured":"van Heerden, R., Leenen, L., Irwin, B., Burke, I.: A computer network attack taxonomy and ontology. International Journal of Cyber Warfare and Terrorism\u00a03, 12\u201325 (2012)","journal-title":"International Journal of Cyber Warfare and Terrorism"},{"doi-asserted-by":"crossref","unstructured":"Fenz, S., Neubauer, T.: How to determine threat probabilities using ontologies and bayesian networks. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, p. 69. ACM (2009)","key":"23_CR7","DOI":"10.1145\/1558607.1558686"},{"issue":"10","key":"23_CR8","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1109\/JSAC.2011.111214","volume":"29","author":"Y. Shavitt","year":"2011","unstructured":"Shavitt, Y., Zilberman, N.: A geolocation databases study. IEEE Journal on Selected Areas in Communications\u00a029(10), 2044\u20132056 (2011)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"unstructured":"Stoll, C.: Tracking a spy through a maze of computer espionage, vol.\u00a01. Doubleday (1989)","key":"23_CR9"},{"unstructured":"Ezzeldin, H.: Nmap detection and countermeasures. Online (March 2008) (accesed September 5, 2012)","key":"23_CR10"},{"unstructured":"Kibret, W.E.: Analyzing network security from a defense in depth perspective. Master\u2019s thesis, Department of Informatics University of Oslo (2011)","key":"23_CR11"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36084-0_1","volume-title":"Recent Advances in Intrusion Detection","author":"K.H. Yung","year":"2002","unstructured":"Yung, K.H.: Detecting long connection chains of interactive terminal sessions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 1\u201316. Springer, Heidelberg (2002)"},{"unstructured":"Spitzner, L.: Honeypots: Catching the insider threat. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 170\u2013179. IEEE (2003)","key":"23_CR13"},{"doi-asserted-by":"crossref","unstructured":"Myers, J., Grimaila, M., Mills, R.: Towards insider threat detection using web server logs. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 54\u201358. ACM (2009)","key":"23_CR14","DOI":"10.1145\/1558607.1558670"},{"issue":"2","key":"23_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1971162.1971171","volume":"41","author":"I. Poese","year":"2011","unstructured":"Poese, I., Uhlig, S., Kaafar, M.A., Donnet, B., Gueye, B.: IP geolocation databases: unreliable? ACM SIGCOMM Computer Communication Review\u00a041(2), 53\u201356 (2011)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"doi-asserted-by":"crossref","unstructured":"Katz-Bassett, E., John, J.P., Krishnamurthy, A., Wetherall, D., Anderson, T., Chawathe, Y.: Towards ip geolocation using delay and topology measurements. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 71\u201384. ACM (2006)","key":"23_CR16","DOI":"10.1145\/1177080.1177090"},{"unstructured":"Sanger, D.: Obama order sped up wave of cyberattacks against iran. Online (June 2012) (accessed August 24, 2012)","key":"23_CR17"},{"issue":"1","key":"23_CR18","doi-asserted-by":"crossref","first-page":"93","DOI":"10.18352\/ijc.343","volume":"7","author":"G. Shiffman","year":"2013","unstructured":"Shiffman, G., Gupta, R.: Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons. International Journal of the Commons\u00a07(1), 93\u2013112 (2013)","journal-title":"International Journal of the Commons"},{"unstructured":"Stout, G.: Testing a website: Best practices. Technical report, Reveregroup (2001) (accessed January 2, 2013)","key":"23_CR19"},{"issue":"4","key":"23_CR20","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T.F. Lunt","year":"1993","unstructured":"Lunt, T.F.: A survey of intrusion detection techniques. Computers & Security\u00a012(4), 405\u2013418 (1993)","journal-title":"Computers & Security"},{"key":"23_CR21","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-0-387-09699-5_17","volume-title":"Proceedings of the IFIP TC 11 23rd International Information Security Conference","author":"G. Tjhai","year":"2008","unstructured":"Tjhai, G., Papadaki, M., Furnell, S., Clarke, N.: Investigating the problem of ids false alarms: An experimental study using snort. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) Proceedings of the IFIP TC 11 23rd International Information Security Conference. IFIP, vol.\u00a0278, pp. 253\u2013267. Springer, Boston (2008)"},{"issue":"5","key":"23_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSECP.2003.1236235","volume":"1","author":"S. Hariri","year":"2003","unstructured":"Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M., Raghavendra, C.S.: Impact analysis of faults and attacks in large-scale networks. IEEE Security & Privacy\u00a01(5), 49\u201354 (2003)","journal-title":"IEEE Security & Privacy"},{"unstructured":"Kuwatly, I., Sraj, M., Al Masri, Z., Artail, H.: A dynamic honeypot design for intrusion detection. In: IEEE International Conference on Pervasive Services (ICPS), pp. 95\u2013104 (2004)","key":"23_CR23"},{"issue":"10","key":"23_CR24","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","volume":"54","author":"M.H. Bhuyan","year":"2011","unstructured":"Bhuyan, M.H., Bhattacharyya, D., Kalita, J.: Surveying port scans and their detection methodologies. The Computer Journal\u00a054(10), 1565\u20131581 (2011)","journal-title":"The Computer Journal"},{"unstructured":"Merritt, D.: Spear phishing attack detection. Master\u2019s thesis, Air Force Institute of Technology (March 2011) (accessed January 1, 2013)","key":"23_CR25"},{"doi-asserted-by":"crossref","unstructured":"Mouton, F., Malan, M.M., Venter, H.S.: Social engineering from a normative ethics perspective. In: Information Security for South Africa, pp. 1\u20138 (2013)","key":"23_CR26","DOI":"10.1109\/ISSA.2013.6641064"},{"doi-asserted-by":"crossref","unstructured":"Bezuidenhout, M., Mouton, F., Venter, H.: Social engineering attack detection model: Seadm. In: Information Security for South Africa, pp. 1\u20138 (2010)","key":"23_CR27","DOI":"10.1109\/ISSA.2010.5588500"},{"unstructured":"Mouton, F., Malan, M., Venter, H.: Development of cognitive functioning psychological measures for the seadm. In: Human Aspects of Information Security & Assurance (2012)","key":"23_CR28"},{"doi-asserted-by":"crossref","unstructured":"Mouton, F., Leenen, L., Malan, M.M., Venter, H.S.: Towards an ontological model defining the social engineering domain. In: 11th Human Choice and Computers International Conference, Turku, Finland (July 2014)","key":"23_CR29","DOI":"10.1007\/978-3-662-44208-1_22"},{"doi-asserted-by":"crossref","unstructured":"Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D.: A network security monitor. In: Proceedings of Computer Society Symposium on Research in Security and Privacy, pp. 296\u2013304. IEEE (1990)","key":"23_CR30","DOI":"10.1109\/RISP.1990.63859"},{"issue":"4","key":"23_CR31","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1013886.1007518","volume":"29","author":"M. Christodorescu","year":"2004","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. ACM SIGSOFT Software Engineering Notes\u00a029(4), 34\u201344 (2004)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"unstructured":"Owen, D.: What is a false positive and why are false positives a problem? Online (May 2010) (accessed November 21, 2012)","key":"23_CR32"},{"key":"23_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdps.2012.3601","volume":"3","author":"S. Manmadhan","year":"2012","unstructured":"Manmadhan, S., Manesh, T.: A method of detecting sql injection attack to secure web applications. International Journal of Distributed and Parallel Systems\u00a03, 1\u20138 (2012)","journal-title":"International Journal of Distributed and Parallel Systems"},{"doi-asserted-by":"crossref","unstructured":"Ciampa, A., Visaggio, C.A., Di Penta, M.: A heuristic-based approach for detecting sql-injection vulnerabilities in web applications. In: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, pp. 43\u201349. ACM (2010)","key":"23_CR34","DOI":"10.1145\/1809100.1809107"},{"issue":"2","key":"23_CR35","first-page":"26","volume":"1","author":"W. Win","year":"2013","unstructured":"Win, W., Htun, H.H.: A simple and efficient framework for detection of sql injection attack. International Journal of Computer & Communication Engineering Research\u00a01(2), 26\u201330 (2013)","journal-title":"International Journal of Computer & Communication Engineering Research"},{"doi-asserted-by":"crossref","unstructured":"Jim, T., Swamy, N., Hicks, M.: Defeating script injection attacks with browser-enforced embedded policies. In: Proceedings of the 16th International Conference on World Wide Web, pp. 601\u2013610. ACM (2007)","key":"23_CR36","DOI":"10.1145\/1242572.1242654"},{"doi-asserted-by":"crossref","unstructured":"Scholte, T., Robertson, W., Balzarotti, D., Kirda, E.: An empirical analysis of input validation mechanisms in web applications and languages. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1419\u20131426. ACM (2012)","key":"23_CR37","DOI":"10.1145\/2245276.2232004"},{"issue":"5","key":"23_CR38","first-page":"61","volume":"3","author":"T. Rao","year":"2012","unstructured":"Rao, T.: Defending against web vulnerabilities and cross-site scripting. Journal of Global Research in Computer Science\u00a03(5), 61\u201364 (2012)","journal-title":"Journal of Global Research in Computer Science"},{"unstructured":"Karig, D., Lee, R.: Remote denial of service attacks and countermeasures. Technical Report CE-L2001-002, Princeton University Department of Electrical Engineering (October 2001) (accessed January 1, 2013)","key":"23_CR39"},{"issue":"2","key":"23_CR40","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Computer Communication Review\u00a034(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"unstructured":"Bhide, A., Elnozahy, E.N., Morgan, S.P.: A highly available network file server. In: Proceedings of the 1991 USENIX Winter Conference, pp. 199\u2013205. Citeseer (1991)","key":"23_CR41"},{"unstructured":"Yang, D., Usynin, A., Hines, J.W.: Anomaly-based intrusion detection for scada systems. In: 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC & HMIT 2005), pp. 12\u201316 (2006)","key":"23_CR42"},{"unstructured":"Gula, R.: Correlating ids alerts with vulnerability information. Technical Report Revision 4, Tenable Network Security (May 2011)","key":"23_CR43"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT and Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44208-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T08:01:54Z","timestamp":1558944114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44208-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662442074","9783662442081"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44208-1_23","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}