{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:14:49Z","timestamp":1725768889356},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1145\/974044.974078","type":"proceedings-article","created":{"date-parts":[[2004,7,20]],"date-time":"2004-07-20T11:55:38Z","timestamp":1090324538000},"page":"207-215","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Generating realistic workloads for network intrusion detection systems"],"prefix":"10.1145","author":[{"given":"Spyros","family":"Antonatos","sequence":"first","affiliation":[{"name":"Institute of Computer Science Foundation for Research & Technology - Hellas"}]},{"given":"Kostas G.","family":"Anagnostakis","sequence":"additional","affiliation":[{"name":"Univ. of Pennsylvania"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"Institute of Computer Science Foundation for Research & Technology - Hellas"}]}],"member":"320","published-online":{"date-parts":[[2004,1]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Nlanr\/dast: Iperf - the tcp\/udp bandwidth measurement tool. http:\/\/dast.nlanr.net\/Projects\/Iperf\/. Nlanr\/dast: Iperf - the tcp\/udp bandwidth measurement tool. http:\/\/dast.nlanr.net\/Projects\/Iperf\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_19"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2004.1266118"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/857183.857559"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"volume-title":"Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II)","year":"2002","author":"Coit C. J.","key":"e_1_3_2_1_6_1","unstructured":"C. J. Coit , S. Staniford , and J. McAlerney . Towards faster pattern matching for intrusion detection, or exceeding the speed of snort . In Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II) , June 2002 . C. J. Coit, S. Staniford, and J. McAlerney. Towards faster pattern matching for intrusion detection, or exceeding the speed of snort. In Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), June 2002."},{"volume-title":"Proceedings of the 7th Hellenic Conference on Informatics (HCI'99)","year":"1999","author":"Courcoubetis C.","key":"e_1_3_2_1_7_1","unstructured":"C. Courcoubetis and V. A. Siris . Measurement and analysis of real network traffic . In Proceedings of the 7th Hellenic Conference on Informatics (HCI'99) , August 1999 . C. Courcoubetis and V. A. Siris. Measurement and analysis of real network traffic. In Proceedings of the 7th Hellenic Conference on Informatics (HCI'99), August 1999."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754719"},{"volume-title":"Practical fast searching in strings. Software - Practice and Experience, 10(6):501--506","year":"1980","author":"Horspool R.","key":"e_1_3_2_1_10_1","unstructured":"R. Horspool . Practical fast searching in strings. Software - Practice and Experience, 10(6):501--506 , 1980 . R. Horspool. Practical fast searching in strings. Software - Practice and Experience, 10(6):501--506, 1980."},{"key":"e_1_3_2_1_11_1","unstructured":"Lawrence Berkeley National Laboratory. The internet traffic archive http:\/\/ita.ee.lbl.gov\/. Lawrence Berkeley National Laboratory. The internet traffic archive http:\/\/ita.ee.lbl.gov\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.814665"},{"volume-title":"Proceedings of CCN'02","year":"2002","author":"Markatos E. P.","key":"e_1_3_2_1_14_1","unstructured":"E. P. Markatos , S. Antonatos , M. Polychronakis , and K. G. Anagnostakis . ExB: Exclusion-based signature matching for intrusion detection . In Proceedings of CCN'02 , November 2002 . E. P. Markatos, S. Antonatos, M. Polychronakis, and K. G. Anagnostakis. ExB: Exclusion-based signature matching for intrusion detection. In Proceedings of CCN'02, November 2002."},{"volume-title":"libpcap. Lawrence Berkeley Laboratory","author":"McCanne S.","key":"e_1_3_2_1_15_1","unstructured":"S. McCanne , C. Leres , and V. Jacobson . libpcap. Lawrence Berkeley Laboratory , Berkeley, CA , available via anonymous ftp to ftp.ee.lbl.gov. S. McCanne, C. Leres, and V. Jacobson. libpcap. Lawrence Berkeley Laboratory, Berkeley, CA, available via anonymous ftp to ftp.ee.lbl.gov."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_17_1","unstructured":"P. Mell V. Hu and R. Lippmann. An overview of issues in testing intrusion detection systems. http:\/\/csrc nist.gov\/publications\/nistir\/nistir-7007.pdf P. Mell V. Hu and R. Lippmann. An overview of issues in testing intrusion detection systems. http:\/\/csrc nist.gov\/publications\/nistir\/nistir-7007.pdf"},{"volume-title":"Proceedings of the Passive and Active Measurement Workshop (PAM)","year":"2003","author":"Moore A.","key":"e_1_3_2_1_18_1","unstructured":"A. Moore , J. Hall , C. Kreibich , E. Harris , and I. Pratt . Architecture of a network monitor . In Proceedings of the Passive and Active Measurement Workshop (PAM) , 2003 . A. Moore, J. Hall, C. Kreibich, E. Harris, and I. Pratt. Architecture of a network monitor. In Proceedings of the Passive and Active Measurement Workshop (PAM), 2003."},{"key":"e_1_3_2_1_19_1","first-page":"45","volume-title":"Network Computing","author":"Mueller P.","year":"2001","unstructured":"P. Mueller and G. Shipley . Dragon claws its way to the top . Network Computing , pages 45 -- 67 , July 2001 . P. Mueller and G. Shipley. Dragon claws its way to the top. Network Computing, pages 45--67, July 2001."},{"key":"e_1_3_2_1_20_1","unstructured":"M. Muuss and T. Slattery. http:\/\/ftp.arl.mil\/ftp\/pub\/ttcp. M. Muuss and T. Slattery. http:\/\/ftp.arl.mil\/ftp\/pub\/ttcp."},{"key":"e_1_3_2_1_21_1","unstructured":"NLANR Measurement and Operations Analysis Team. NLANR network traffic packet header traces. http:\/\/pma.nlanr.net\/Traces\/. NLANR Measurement and Operations Analysis Team. NLANR network traffic packet header traces. http:\/\/pma.nlanr.net\/Traces\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306571"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"volume-title":"October","year":"2002","author":"Detection Revisited 0","key":"e_1_3_2_1_25_1","unstructured":"Sourcefire. Snort 2. 0 - Detection Revisited . http:\/\/www.snort.org\/docs\/Snort_20_v4.pdf , October 2002 . Sourcefire. Snort 2.0 - Detection Revisited. http:\/\/www.snort.org\/docs\/Snort_20_v4.pdf, October 2002."},{"key":"e_1_3_2_1_26_1","unstructured":"S. I. stress tool. http:\/\/www.eurocompton.net\/stick. S. I. stress tool. http:\/\/www.eurocompton.net\/stick."},{"volume-title":"December","year":"2001","author":"The NSS Group","key":"e_1_3_2_1_27_1","unstructured":"The NSS Group . Intrusion detection systems group test , December 2001 . http:\/\/www.nss.co.uk\/ids. The NSS Group. Intrusion detection systems group test, December 2001. http:\/\/www.nss.co.uk\/ids."},{"key":"e_1_3_2_1_28_1","unstructured":"The Shmoo Group. Capture the flag contest (defcon). Available at http:\/\/www.shmoo.com\/cctff. The Shmoo Group. Capture the flag contest (defcon). Available at http:\/\/www.shmoo.com\/cctff."},{"key":"e_1_3_2_1_29_1","unstructured":"S. tool. http:\/\/www.stolenshoes.net\/sniph\/index.html. S. tool. http:\/\/www.stolenshoes.net\/sniph\/index.html."},{"key":"e_1_3_2_1_30_1","first-page":"117","volume-title":"Proceedings of the Workshop on Passive and Active Measurement (PAM 2000","author":"Veitch D.","year":"2000","unstructured":"D. Veitch , J.-A. Backar , J. Wall , J. Yates , and M. Roughan . On-line generation of fractal and multifractal traffic . In Proceedings of the Workshop on Passive and Active Measurement (PAM 2000 ), pages 117 -- 126 , April 2000 . D. Veitch, J.-A. Backar, J. Wall, J. Yates, and M. Roughan. On-line generation of fractal and multifractal traffic. In Proceedings of the Workshop on Passive and Active Measurement (PAM 2000), pages 117--126, April 2000."}],"event":{"name":"WOSP04: Fourth International Workshop on Software and Performance 2004","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Redwood Shores California","acronym":"WOSP04"},"container-title":["Proceedings of the 4th international workshop on Software and performance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/974044.974078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T17:45:08Z","timestamp":1693849508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/974044.974078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":29,"alternative-id":["10.1145\/974044.974078","10.1145\/974044"],"URL":"https:\/\/doi.org\/10.1145\/974044.974078","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/974043.974078","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,1]]},"assertion":[{"value":"2004-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}