Ontology type: schema:Chapter
2007
AUTHORSWilliam Mahoney , William Sousan
ABSTRACTA significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as ”intrusion detection” (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system. More... »
PAGES151-163
Runtime Verification
ISBN978-3-540-77394-8
http://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13
DOIhttp://dx.doi.org/10.1007/978-3-540-77395-5_13
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1009474404
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "University of Nebraska at Omaha",
"id": "https://www.grid.ac/institutes/grid.266815.e",
"name": [
"University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500"
],
"type": "Organization"
},
"familyName": "Mahoney",
"givenName": "William",
"id": "sg:person.0667471260.00",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0667471260.00"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Nebraska at Omaha",
"id": "https://www.grid.ac/institutes/grid.266815.e",
"name": [
"University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500"
],
"type": "Organization"
},
"familyName": "Sousan",
"givenName": "William",
"id": "sg:person.015234355535.15",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234355535.15"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1145/321239.321249",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1013145323"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/363347.363387",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1051697423"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1142/s0129054108005619",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1062896854"
],
"type": "CreativeWork"
}
],
"datePublished": "2007",
"datePublishedReg": "2007-01-01",
"description": "A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as \u201dintrusion detection\u201d (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system.",
"editor": [
{
"familyName": "Sokolsky",
"givenName": "Oleg",
"type": "Person"
},
{
"familyName": "Ta\u015f\u0131ran",
"givenName": "Serdar",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-540-77395-5_13",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-540-77394-8"
],
"name": "Runtime Verification",
"type": "Book"
},
"name": "Instrumentation of Open-Source Software for Intrusion Detection",
"pagination": "151-163",
"productId": [
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-540-77395-5_13"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"2d21c8d271c567e44d1c1ccebabccfa290df54bb691d9687226ab174b32e5949"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1009474404"
]
}
],
"publisher": {
"location": "Berlin, Heidelberg",
"name": "Springer Berlin Heidelberg",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-540-77395-5_13",
"https://app.dimensions.ai/details/publication/pub.1009474404"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-16T05:42",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000347_0000000347/records_89789_00000000.jsonl",
"type": "Chapter",
"url": "https://link.springer.com/10.1007%2F978-3-540-77395-5_13"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'
This table displays all metadata directly associated to this object as RDF triples.
85 TRIPLES
23 PREDICATES
30 URIs
20 LITERALS
8 BLANK NODES