{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:36:27Z","timestamp":1737178587666,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726920"},{"type":"electronic","value":"9783540726937"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72693-7_5","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T08:33:29Z","timestamp":1183365209000},"page":"81-98","source":"Crossref","is-referenced-by-count":4,"title":["Self-Organized Network Security Facilities based on Bio-inspired Promoters and Inhibitors"],"prefix":"10.1007","author":[{"given":"Falko","family":"Dressler","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"H.-W. Braun, k. Claffy, and G. C. Polyzos, \u201cA framework for flow-based accounting on the Internet,\u201d in IEEE Singapore International Conference on Networks (SICON\u201993), Singapore, September 1993, pp. 847-851.","key":"5_CR1_5","DOI":"10.1109\/SICON.1993.515706"},{"unstructured":"B. Caswell and J. Hewlett, \u201cSnort Users Manual,\u201d The Snort Project, Manual, May 2004.","key":"5_CR2_5"},{"key":"5_CR3_5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"10","author":"RKC Chang","year":"2002","unstructured":"R. K. C. Chang, \u201cDefending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial,\u201d IEEE Communications Magazine, vol. 10, pp. 42-51, October 2002.","journal-title":"IEEE Communications Magazine"},{"doi-asserted-by":"crossref","unstructured":"B. Claise, \u201cCisco Systems NetFlow Services Export Version 9,\u201d RFC 3954, October 2004.","key":"5_CR4_5","DOI":"10.17487\/rfc3954"},{"unstructured":"\u2014\u2014, \u201cIPFIX Protocol Specification,\u201d Internet-Draft (work in progress), draft-ietf-ipfix-protocol-22.txt, June 2006.","key":"5_CR5_5"},{"unstructured":"F. Dressler, \u201cAdaptive network monitoring for self-organizing network security mechanisms,\u201d in IFIP International Conference on Telecommunication Systems, Modeling and Analysis 2005 (ICTSM2005), Dallas, TX, USA, November 2005, pp. 67-75.","key":"5_CR6_5"},{"unstructured":"\u2014\u2014, \u201cEfficient and Scalable Communication in Autonomous Networking using Bio-inspired Mechanisms - An Overview,\u201d Informatica - An International Journal of Computing and Informatics, vol. 29, no. 2, pp. 183-188, July 2005.","key":"5_CR7_5"},{"doi-asserted-by":"crossref","unstructured":"F. Dressler and I. Dietrich, \u201cSimulative Analysis of Adaptive Network Monitoring Methodologies for Attack Detection,\u201d in IEEE EUROCON 2005 - The International Conference on \"Computer as a Tool\", Belgrade, Serbia and Montenegro, November 2005, pp. 624-627.","key":"5_CR8_5","DOI":"10.1109\/EURCON.2005.1630007"},{"unstructured":"F. Dressler and B. Kr\u00fcger, \u201cCell biology as a key to computer networking,\u201d in German Conference on Bioinformatics 2004 (GCB\u201904), Poster Session, Bielefeld, Germany, October 2004.","key":"5_CR9_5"},{"doi-asserted-by":"crossref","unstructured":"F. Dressler and G. M\u00fcnz, \u201cFlexible Flow Aggregation for Adaptive Network Monitoring,\u201d in 31st IEEE Conference on Local Computer Networks (LCN): 1st IEEE LCN Workshop on Network Measurements (WNM 2006), Tampa, Florida, November 2006, pp. 702-709.","key":"5_CR10_5","DOI":"10.1109\/LCN.2006.322180"},{"unstructured":"F. Dressler, G. M\u00fcnz, and G. Carle, \u201cCATS - Cooperating Autonomous Detection Systems,\u201d in 1st IFIP International Workshop on Autonomic Communication (WAC 2004), Poster Session, Berlin, Germany, October 2004.","key":"5_CR11_5"},{"unstructured":"F. Dressler, C. Sommer, and G. M\u00fcnz, \u201cIPFIX Aggregation,\u201d Internet-Draft (work in progress), draft-dressler-ipfix-aggregation-03.txt, June 2006.","key":"5_CR12_5"},{"issue":"3","key":"5_CR13_5","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/90.929851","volume":"9","author":"N Duffield","year":"2001","unstructured":"N. Duffield and M. Grossglauser, \u201cTrajectory Sampling for Direct Traffic Observation,\u201d IEEE\/ACM Transactions on Networking (TON), vol. 9, no. 3, pp. 280-292, June 2001.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"unstructured":"N. Duffield, \u201cA Framework for Packet Selection and Reporting,\u201d Internet-Draft (work in progress), draft-ietf-psamp-framework-10.txt, January 2005.","key":"5_CR14_5"},{"unstructured":"A. Fessi, G. Carle, F. Dressler, J. Quittek, C. Kappler, and H. Tschofenig, \u201cNSLP for Metering Configuration Signaling,\u201d Internet-Draft (work in progress), draft-dressler-nsis-metering-nslp-04.txt, June 2006.","key":"5_CR15_5"},{"doi-asserted-by":"crossref","unstructured":"Y. Hu, D.-M. Chiu, and J. C. Lui, \u201cAdaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks,\u201d in IEEE\/IFIP Network Operations and Management Symposium (IEEE\/IFIP NOMS 2006), Vancouver, Canada, April 2006, pp. 424-435.","key":"5_CR16_5","DOI":"10.1109\/NOMS.2006.1687572"},{"unstructured":"C. A. Janeway, M. Walport, and P. Travers, Immunobiology: The Immune System in Health and Disease, 5th ed. Garland Publishing, 2001.","key":"5_CR17_5"},{"issue":"1","key":"5_CR18_5","first-page":"43","volume":"1","author":"B Kr\u00fcger","year":"2005","unstructured":"B. Kr\u00fcger and F. Dressler, \u201cMolecular Processes as a Basis for Autonomous Networking,\u201d IPSI Transactions on Advances Research: Issues in Computer Science and Engineering, vol. 1, no. 1, pp. 43-50, January 2005.","journal-title":"IPSI Transactions on Advances Research: Issues in Computer Science and Engineering"},{"unstructured":"T.-H. Lee, W.-K. Wu, and T.-Y. W. Huang, \u201cScalable Packet Digesting Schemes for IP Traceback,\u201d in IEEE International Conference on Communications, Paris, France, June 2004.","key":"5_CR19_5"},{"issue":"2","key":"5_CR20_5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"J. Mirkovic and P. Reiher, \u201cA Taxonomy of DDoS Attack and DDoS Defense Mechanisms,\u201d ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39-53, April 2004.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"5_CR21_5","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S1388-3437(03)80172-5","volume-title":"18th International Teletraffic Congress (ITC18), ser. Providing Quality of Service in Heterogeneous Environments","author":"M Molina","year":"2003","unstructured":"M. Molina, \u201cA scalable and efficient methodology for flow monitoring in the Internet,\u201d in 18th International Teletraffic Congress (ITC18), ser. Providing Quality of Service in Heterogeneous Environments, J. Charzinski, R. Lehnert, and P. Tran-Gia, Eds., vol. 5a. Berlin, Germany: Elsevier, August 2003, pp. 271-280."},{"issue":"23-24","key":"5_CR22_5","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"V. Paxson, \u201cBro: A System for Detecting Network Intruders in Real-Time,\u201d Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, December 1999.","journal-title":"Computer Networks"},{"unstructured":"J. Quittek, S. Bryant, B. Claise, and J. Meyer, \u201cInformation Model for IP Flow Information Export,\u201d Internet-Draft (work in progress), draft-ietf-ipfix-info-12.txt, June 2006.","key":"5_CR23_5"},{"unstructured":"M. Roesch, \u201cSnort: Lightweight Intrusion Detection for Networks,\u201d in 13th USENIX Conference on System Administration. USENIX Association, 1999, pp. 229-238.","key":"5_CR24_5"},{"doi-asserted-by":"crossref","unstructured":"R. F. Schmidt, F. Lang, and G. Thews, Physiologie des Menschen, 29th ed. Springer Verlag, 2005.","key":"5_CR25_5","DOI":"10.1007\/b137547"},{"unstructured":"T. Zseby, M. Molina, N. Duffield, S. Niccolini, and F. Raspall, \u201cSampling and Filtering Techniques for IP Packet Selection,\u201d Internet-Draft (work in progress), draft-ietf-psamp-sample-tech-07.txt, July 2005.","key":"5_CR26_5"}],"container-title":["Studies in Computational Intelligence","Advances in Biologically Inspired Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72693-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T02:20:15Z","timestamp":1737166815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72693-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540726920","9783540726937"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72693-7_5","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}