{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:34:46Z","timestamp":1725615286565},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["KO 3445\/16-1"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297663.3310313","type":"proceedings-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T09:27:26Z","timestamp":1554456446000},"page":"159-166","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Performance Oriented Dynamic Bypassing for Intrusion Detection Systems"],"prefix":"10.1145","author":[{"given":"Lukas","family":"Iffl\u00e4nder","sequence":"first","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Jonathan","family":"Stoll","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Nishant","family":"Rawtani","sequence":"additional","affiliation":[{"name":"Hewlett Packard Enterprise, Mumbai, India"}]},{"given":"Veronika","family":"Lesch","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Klaus-Dieter","family":"Lange","sequence":"additional","affiliation":[{"name":"Hewlett Packard Enterprise, Houston, TX, USA"}]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"volume-title":"Global Hybrid Cloud Market 2014-2021|Statistic. (Oct","year":"2018","key":"e_1_3_2_1_1_1","unstructured":"2018. Global Hybrid Cloud Market 2014-2021|Statistic. (Oct . 2018 ). https:\/\/www.statista.com\/statistics\/609581\/worldwide-hybrid-cloud-market-size {On-line; accessed 30. Oct. 2018}. 2018. Global Hybrid Cloud Market 2014-2021|Statistic. (Oct. 2018). https:\/\/www.statista.com\/statistics\/609581\/worldwide-hybrid-cloud-market-size {On-line; accessed 30. Oct. 2018}."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.07.024"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494621.2494631"},{"key":"e_1_3_2_1_4_1","unstructured":"Ayushi Chahal and Ritu Nagpal. 2016. Performance of Snort on Darpa Dataset and Different False Alert Reduction Techniques. In 3rd International Conference on Electrical Electronics Engineering Trends Communication Optimization and Sciences (EEECOS). https:\/\/pdfs.semanticscholar.org\/9634\/2f678949bcae35eabda3cfafeb0d0abe1d32.pdf Ayushi Chahal and Ritu Nagpal. 2016. Performance of Snort on Darpa Dataset and Different False Alert Reduction Techniques. In 3rd International Conference on Electrical Electronics Engineering Trends Communication Optimization and Sciences (EEECOS). https:\/\/pdfs.semanticscholar.org\/9634\/2f678949bcae35eabda3cfafeb0d0abe1d32.pdf"},{"key":"e_1_3_2_1_5_1","volume-title":"Challenges & Call for Action. SDN and OpenFlow World Congress","author":"Chiosi Margaret","year":"2012","unstructured":"Margaret Chiosi , Don Clarke , Peter Willis , Andy Reid , James Feger , Michael Bugenhagen , Waqar Khan , Michael Fargano , Dr. Chunfeng Cui , Dr. Hui Deng , Javier Benitez , Uwe Micheel , Herbert Damker , Kenichi Ogaki , Tetsuro Matsuzaki , Masaki Fukui , Katsuhiro Shimano , Dominique Delisle , Quentin Loudier , Christos Kolias , Ivano Guardini , Elena Demaria , Roberto Minerva , Antonio Manzalini , Diego Lopez , Francisco Javier Ramon Salguero , Frank Ruhl , and Prodip Sen . 2012 . Network Functions Virtualization (NFV), An Introduction, Benefits, Enablers , Challenges & Call for Action. SDN and OpenFlow World Congress , Darmstadt, Germany. (2012). http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf Margaret Chiosi, Don Clarke, Peter Willis, Andy Reid, James Feger, Michael Bugenhagen, Waqar Khan, Michael Fargano, Dr. Chunfeng Cui, Dr. Hui Deng, Javier Benitez, Uwe Micheel, Herbert Damker, Kenichi Ogaki, Tetsuro Matsuzaki, Masaki Fukui, Katsuhiro Shimano, Dominique Delisle, Quentin Loudier, Christos Kolias, Ivano Guardini, Elena Demaria, Roberto Minerva, Antonio Manzalini, Diego Lopez, Francisco Javier Ramon Salguero, Frank Ruhl, and Prodip Sen. 2012. Network Functions Virtualization (NFV), An Introduction, Benefits, Enablers, Challenges & Call for Action. SDN and OpenFlow World Congress, Darmstadt, Germany. (2012). http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"David Day and Benjamin Burns. 2011. A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines. https:\/\/www.thinkmind.org\/download.php?articleid=icds_2011_7_40_90007 David Day and Benjamin Burns. 2011. A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines. https:\/\/www.thinkmind.org\/download.php?articleid=icds_2011_7_40_90007"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829966"},{"key":"e_1_3_2_1_8_1","volume-title":"2015 IOUG Data Integration For Cloud Survey. (May","author":"McKendrick Joseph","year":"2015","unstructured":"Joseph McKendrick . 2015. 2015 IOUG Data Integration For Cloud Survey. (May 2015 ). http:\/\/www.oracle.com\/us\/products\/middleware\/data-integration\/ioug-di-for-cloud-survey-2596248.pdf Produced by Unisphere Research, a Division of Information Today, Inc . Joseph McKendrick. 2015. 2015 IOUG Data Integration For Cloud Survey. (May 2015). http:\/\/www.oracle.com\/us\/products\/middleware\/data-integration\/ioug-di-for-cloud-survey-2596248.pdf Produced by Unisphere Research, a Division of Information Today, Inc."},{"key":"e_1_3_2_1_9_1","volume-title":"Efm: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. computers & security","author":"Meng Weizhi","year":"2014","unstructured":"Weizhi Meng , Wenjuan Li , and Lam-For Kwok . 2014 . Efm: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. computers & security , Vol. 43 (2014), 189--204. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. 2014. Efm: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. computers & security, Vol. 43 (2014), 189--204."},{"key":"e_1_3_2_1_10_1","volume-title":"Security Position Paper: Network Function Virtualization. (March","author":"Milenkoski Aleksandar","year":"2016","unstructured":"Aleksandar Milenkoski , Bernd Jaeger , Kapil Raina , Mason Harris , Saif Chaudhry , Sivadon Chasiri , Veronica David , and Wenmao Liu . 2016. Security Position Paper: Network Function Virtualization. (March 2016 ). https:\/\/cloudsecurityalliance.org\/download\/security-position-paper-network-function-virtualization\/ Published by Cloud Security Alliance (CSA) - Virtualization Working Group . Aleksandar Milenkoski, Bernd Jaeger, Kapil Raina, Mason Harris, Saif Chaudhry, Sivadon Chasiri, Veronica David, and Wenmao Liu. 2016. Security Position Paper: Network Function Virtualization. (March 2016). https:\/\/cloudsecurityalliance.org\/download\/security-position-paper-network-function-virtualization\/ Published by Cloud Security Alliance (CSA) - Virtualization Working Group."},{"key":"e_1_3_2_1_11_1","volume-title":"Impact of SDN and NFV on OSS\/BSS - ONF Solution Brief. (1","author":"Foundation Open Networking","year":"2016","unstructured":"Open Networking Foundation . 2016. Impact of SDN and NFV on OSS\/BSS - ONF Solution Brief. (1 March 2016 ). https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/solution-briefs\/sb-OSS-BSS.pdf Open Networking Foundation. 2016. Impact of SDN and NFV on OSS\/BSS - ONF Solution Brief. (1 March 2016). https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/solution-briefs\/sb-OSS-BSS.pdf"},{"key":"e_1_3_2_1_14_1","volume-title":"Characterizing the Performance of Network Intrusion Detection Sensors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 155--172","author":"Schaelicke Lambert","year":"2003","unstructured":"Lambert Schaelicke , Thomas Slabach , Branden Moore , and Curt Freeland . 2003 . Characterizing the Performance of Network Intrusion Detection Sensors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 155--172 . Lambert Schaelicke, Thomas Slabach, Branden Moore, and Curt Freeland. 2003. Characterizing the Performance of Network Intrusion Detection Sensors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 155--172."},{"volume-title":"Cloud Security Spotlight Report. (2015). https:\/\/goo.gl\/rMGh3x Presented by Information Security","author":"Schulze Holger","key":"e_1_3_2_1_15_1","unstructured":"Holger Schulze . 2015. Cloud Security Spotlight Report. (2015). https:\/\/goo.gl\/rMGh3x Presented by Information Security , LinkedIn Group Partner . Holger Schulze. 2015. Cloud Security Spotlight Report. (2015). https:\/\/goo.gl\/rMGh3x Presented by Information Security, LinkedIn Group Partner."},{"key":"e_1_3_2_1_16_1","volume-title":"Performance Characterization & Improvement of Snort As an IDS. Bell Labs Report","author":"Sen Soumya","year":"2006","unstructured":"Soumya Sen . 2006. Performance Characterization & Improvement of Snort As an IDS. Bell Labs Report ( 2006 ). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.720.2007&rep=rep1&type=pdf Soumya Sen. 2006. Performance Characterization & Improvement of Snort As an IDS. Bell Labs Report (2006). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.720.2007&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"The Average Webpage Is Now the Size of the Original Doom. WIRED (March","author":"Staff Wired","year":"2018","unstructured":"Wired Staff . 2018. The Average Webpage Is Now the Size of the Original Doom. WIRED (March 2018 ). https:\/\/www.wired.com\/2016\/04\/average-webpage-now-size-original-doom Wired Staff. 2018. The Average Webpage Is Now the Size of the Original Doom. WIRED (March 2018). https:\/\/www.wired.com\/2016\/04\/average-webpage-now-size-original-doom"},{"key":"e_1_3_2_1_18_1","volume-title":"Investigating the Problem of Ids False Alarms: An Experimental Study Using Snort. In IFIP International Information Security Conference. Springer, 253--267","author":"Tjhai Gina C","year":"2008","unstructured":"Gina C Tjhai , Maria Papadaki , SM Furnell , and Nathan L Clarke . 2008 . Investigating the Problem of Ids False Alarms: An Experimental Study Using Snort. In IFIP International Information Security Conference. Springer, 253--267 . https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-0-387-09699-5_17.pdf Gina C Tjhai, Maria Papadaki, SM Furnell, and Nathan L Clarke. 2008. Investigating the Problem of Ids False Alarms: An Experimental Study Using Snort. In IFIP International Information Security Conference. Springer, 253--267. https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-0-387-09699-5_17.pdf"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030088"}],"event":{"name":"ICPE '19: Tenth ACM\/SPEC International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Mumbai India","acronym":"ICPE '19"},"container-title":["Proceedings of the 2019 ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297663.3310313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T15:57:35Z","timestamp":1673107055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297663.3310313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":17,"alternative-id":["10.1145\/3297663.3310313","10.1145\/3297663"],"URL":"https:\/\/doi.org\/10.1145\/3297663.3310313","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}