{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:00:20Z","timestamp":1725516020457},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540850717"},{"type":"electronic","value":"9783540850724"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85072-4_10","type":"book-chapter","created":{"date-parts":[[2008,8,4]],"date-time":"2008-08-04T11:58:44Z","timestamp":1217851124000},"page":"107-118","source":"Crossref","is-referenced-by-count":10,"title":["A Hybrid Model for Immune Inspired Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Robert L.","family":"Fanelli","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Kim, J., McLeod, J., Cayzer, S.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: 1st International Conference on Artificial Immune Systems (ICARIS 2002), University of Kent, Canterbury, UK, pp. 141\u2013148 (2002)","DOI":"10.2139\/ssrn.2832054"},{"key":"10_CR3","volume-title":"Snort 2.1 Intrusion Detection","author":"J. Beale","year":"2004","unstructured":"Beale, J., Caswell, B., Kohlenberg, T., Poor, M.: Snort 2.1 Intrusion Detection. Syngress Publishing, Rockland (2004)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/ICDEW.2006.149","volume-title":"22nd International Conference on Data Engineering Workshops (ICDEW 2006)","author":"B.C. Chen","year":"2006","unstructured":"Chen, B.C., Yegneswaran, V., Barford, P., Ramakrishnan, R.: Toward a Query Language for Network Attack Data. In: 22nd International Conference on Data Engineering Workshops (ICDEW 2006), pp. 28\u201336. IEEE Press, New York (2006)"},{"key":"10_CR5","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L. DeCastro","year":"2002","unstructured":"DeCastro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)"},{"key":"10_CR6","unstructured":"Deri, L., Suin, S., Maselli, G.: Design and Implementation of an Anomaly Detection System: an Empirical Approach. In: TERENA Network Conference, Zagreb, Croatia (2003)"},{"issue":"10","key":"10_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/116873.116878","volume":"23","author":"Z. Galil","year":"1991","unstructured":"Galil, Z., Italiano, G.F.: Data structures and algorithms for disjoint set union problems. ACM Computing Surveys\u00a023(3), 319\u2013344 (1991)","journal-title":"ACM Computing Surveys"},{"key":"10_CR9","unstructured":"Galstad, E.: Nagios Home Page (2007), http:\/\/www.nagios.org"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11823940_31","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2006","unstructured":"Greensmith, J., Aickelin, U., Twycross, J.: Articulation and Clarification of the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"10_CR12","volume-title":"Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006)","author":"J. Greensmith","year":"2006","unstructured":"Greensmith, J., Twycross, J., Aickelin, U.: Dendritic Cells for Anomaly Detection. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006). IEEE Press, Vancouver (2006)"},{"issue":"4","key":"10_CR13","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S.A. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture for an Artificial Immune System. IEEE Transactions on Evolutionary Computation\u00a08(4), 443\u2013473 (2000)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10_CR14","unstructured":"Kim, J., Bentley, P.: An Artificial Immune Model for Network Intrusion Detection. In: 7th European Congress on Intelligent Techniques and Soft Computing. Aachen (1999)"},{"key":"10_CR15","first-page":"1244","volume-title":"IEEE Congress on Evolutionary Computation (CEC 2001)","author":"J. Kim","year":"2002","unstructured":"Kim, J., Bentley, P.J.: Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. In: IEEE Congress on Evolutionary Computation (CEC 2001), pp. 1244\u20131252. IEEE Press, New York (2002)"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection \u2013 a review. Natural Computing\u00a06(4), 413\u2013466 (2007)","journal-title":"Natural Computing"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Kim, J., Greensmith, J., Twycross, J., Aickelin, U.: Malicious Code Execution Detection and Response Immune System Inspired by the Danger Theory. In: Adaptive and Resilient Computing Security Workshop, Santa Fe, NM (2005)","DOI":"10.2139\/ssrn.2832006"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks\u00a034, 579\u2013595 (2000)","journal-title":"Computer Networks"},{"key":"10_CR19","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, Danger, and the Extended Family. Annual Review of Immunology\u00a012, 991\u20131045 (1994)","journal-title":"Annual Review of Immunology"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1046\/j.1365-3083.2001.00974.x","volume":"54","author":"P. Matzinger","year":"2001","unstructured":"Matzinger, P.: The Danger Model in Its Historical Context. Scandanavian Journal of Immunology\u00a054, 4\u20139 (2001)","journal-title":"Scandanavian Journal of Immunology"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1126\/science.1071059","volume":"296","author":"P. Matzinger","year":"2002","unstructured":"Matzinger, P.: The Danger Model: A Renewed Sense of Self. Science\u00a0296, 301\u2013305 (2002)","journal-title":"Science"},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1038\/ni0107-11","volume":"8","author":"P. Matzinger","year":"2007","unstructured":"Matzinger, P.: Friendly and dangerous signals: is the tissue in control? Nature Immunology\u00a08(1), 11\u201313 (2007)","journal-title":"Nature Immunology"},{"key":"10_CR23","unstructured":"Snort: Snort - The Open Source Network Intrusion Detection System (2007), http:\/\/www.snort.org"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/CEC.2005.1554799","volume-title":"IEEE Congress on Evolutionary Computation (CEC 2005)","author":"T. Stibor","year":"2005","unstructured":"Stibor, T., Timmis, J., Eckert, C.: On the Appropriateness of Negative Selection Defined Over Hamming Shape-Space as a Network Intrusion Detection System. In: IEEE Congress on Evolutionary Computation (CEC 2005), pp. 995\u20131002. IEEE Press, New York (2005)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11823940_15","volume-title":"Artificial Immune Systems","author":"G. Tedesco","year":"2006","unstructured":"Tedesco, G., Twycross, J., Aickelin, U.: Integrating Innate and Adaptive Immunity for Intrusion Detection. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 193\u2013202. Springer, Heidelberg (2006)"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/11536444_9","volume-title":"Artificial Immune Systems","author":"J. Twycross","year":"2005","unstructured":"Twycross, J., Aickelin, U.: Towards a Conceptual Framework for Innate Immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 112\u2013125. Springer, Heidelberg (2005)"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1109\/CEC.2006.1688351","volume-title":"IEEE Congress on Evolutionary Computation (CEC 2006)","author":"J. Twycross","year":"2006","unstructured":"Twycross, J., Aickelin, U.: Libtissue - Implementing Innate Immunity. In: IEEE Congress on Evolutionary Computation (CEC 2006), pp. 499\u2013506. IEEE Press, New York (2006)"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/781027.781045","volume-title":"ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","author":"V. Yegneswaran","year":"2003","unstructured":"Yegneswaran, V., Barford, P., Ullrich, J.: Internet Intrusions: Global Characteristics and Prevalence. In: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 138\u2013147. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85072-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:39:31Z","timestamp":1619509171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85072-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540850717","9783540850724"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85072-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}