{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:21:13Z","timestamp":1772644873565,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030322571","type":"print"},{"value":"9783030322588","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_59","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"505-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Experimenting with Machine Learning in Automated Intrusion Response"],"prefix":"10.1007","author":[{"given":"Andre","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"59_CR1","doi-asserted-by":"publisher","unstructured":"Anuar, N.B., Papadaki, M., Furnell, S., Clarke, N.: An investigation and survey of response options for intrusion response systems (IRSs). In: Information Security for South Africa (ISSA), 2010, pp. 1\u20138. IEEE (2010). \n                    https:\/\/doi.org\/10.1109\/ISSA.2010.5588654","DOI":"10.1109\/ISSA.2010.5588654"},{"issue":"2","key":"59_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/a10020039","volume":"10","author":"S Anwar","year":"2017","unstructured":"Anwar, S., Mohamad Zain, J., Zolkipli, M.F., Inayat, Z., Khan, S., Anthony, B., Chang, V.: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms 10(2), 39 (2017). \n                    https:\/\/doi.org\/10.3390\/a10020039","journal-title":"Algorithms"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Bace, R., Mell, P.: Nist special publication on intrusion detection systems. Technical report, Booz-Allen and Hamilton Inc., McLean, VA (2001)","DOI":"10.6028\/NIST.SP.800-31"},{"issue":"1","key":"59_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/2723872.2723882","volume":"49","author":"C Boettiger","year":"2015","unstructured":"Boettiger, C.: An introduction to docker for reproducible research. ACM SIGOPS Operating Syst. Rev. 49(1), 71\u201379 (2015). \n                    https:\/\/doi.org\/10.1145\/2723872.2723882","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"59_CR5","unstructured":"Bui, T.: Analysis of docker security. arXiv preprint \n                    arXiv:1501.02967\n                    \n                   (2015)"},{"key":"59_CR6","unstructured":"Cannady, J.: Next generation intrusion detection: autonomous reinforcement learning of network attacks. In: Proceedings of the 23rd National Information Systems Security Conference, pp. 1\u201312 (2000)"},{"key":"59_CR7","doi-asserted-by":"publisher","unstructured":"Felter, W., Ferreira, A., Rajamony, R., Rubio, J.: An updated performance comparison of virtual machines and linux containers. In: 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 171\u2013172. IEEE (2015). \n                    https:\/\/doi.org\/10.1109\/ISPASS.2015.7095802","DOI":"10.1109\/ISPASS.2015.7095802"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Hessel, M., Modayil, J., Van Hasselt, H., Schaul, T., Ostrovski, G., Dabney, W., Horgan, D., Piot, B., Azar, M., Silver, D.: Rainbow: combining improvements in deep reinforcement learning. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v33i01.33013796"},{"key":"59_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2015.12.006","volume":"62","author":"Z Inayat","year":"2016","unstructured":"Inayat, Z., Gani, A., Anuar, N.B., Khan, M.K., Anwar, S.: Intrusion response systems: foundations, design, and challenges. J. Netw. Comput. Appl. 62, 53\u201374 (2016). \n                    https:\/\/doi.org\/10.1016\/j.jnca.2015.12.006","journal-title":"J. Netw. Comput. Appl."},{"key":"59_CR10","doi-asserted-by":"publisher","unstructured":"Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Dubus, S.: Risk-aware framework for activating and deactivating policy-based response. In: 2010 4th International Conference on Network and System Security (NSS), pp. 207\u2013215. IEEE (2010). \n                    https:\/\/doi.org\/10.1109\/NSS.2010.80","DOI":"10.1109\/NSS.2010.80"},{"key":"59_CR11","unstructured":"Kuhnle, A., Schaarschmidt, M., Fricke, K.: Tensorforce: a tensorflow library for applied reinforcement learning (2017). \n                    https:\/\/github.com\/tensorforce\/tensorforce"},{"key":"59_CR12","unstructured":"Muniz, S., Ortega, A.: Fuzzing and debugging cisco IOS. BlackHat Europe (2011)"},{"key":"59_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2014.04.009","volume":"45","author":"A Shameli-Sendi","year":"2014","unstructured":"Shameli-Sendi, A., Cheriet, M., Hamou-Lhadj, A.: Taxonomy of intrusion risk assessment and response system. Comput. Secur. 45, 1\u201316 (2014). \n                    https:\/\/doi.org\/10.1016\/j.cose.2014.04.009","journal-title":"Comput. Secur."},{"issue":"1","key":"59_CR14","first-page":"1","volume":"12","author":"A Shameli-Sendi","year":"2012","unstructured":"Shameli-Sendi, A., Ezzati-Jivan, N., Jabbarifar, M., Dagenais, M.: Intrusion response systems: survey and taxonomy. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 12(1), 1\u201314 (2012)","journal-title":"Int. J. Comput. Sci. Netw. Secur. (IJCSNS)"},{"issue":"1\u20132","key":"59_CR15","first-page":"169","volume":"1","author":"N Stakhanova","year":"2007","unstructured":"Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. Int. J. Inf. Comput. Secur. 1(1\u20132), 169\u2013184 (2007)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"59_CR16","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"2018","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (2018)"},{"key":"59_CR17","doi-asserted-by":"publisher","unstructured":"Xavier, M.G., Neves, M.V., Rossi, F.D., Ferreto, T.C., Lange, T., De Rose, C.A.: Performance evaluation of container-based virtualization for high performance computing environments. In: 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, pp. 233\u2013240. IEEE (2013). \n                    https:\/\/doi.org\/10.1109\/PDP.2013.41","DOI":"10.1109\/PDP.2013.41"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:38:06Z","timestamp":1569922686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_59","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}