{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:02:11Z","timestamp":1725559331414},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145469"},{"type":"electronic","value":"9783642145476"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14547-6_21","type":"book-chapter","created":{"date-parts":[[2010,7,16]],"date-time":"2010-07-16T02:32:37Z","timestamp":1279247557000},"page":"264-275","source":"Crossref","is-referenced-by-count":4,"title":["Further Experimentation with Hybrid Immune Inspired Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Robert L.","family":"Fanelli","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., et al.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"1807","DOI":"10.1109\/CEC.2008.4631034","volume-title":"Proceedings of the IEEE World Congress on Evolutionary Computation 2008 (CEC 2008)","author":"Y. Al-Hammadi","year":"2008","unstructured":"Al-Hammadi, Y., Aickelin, U., Greensmith, J.: The DCA for Bot Detection. In: Proceedings of the IEEE World Congress on Evolutionary Computation 2008 (CEC 2008), pp. 1807\u20131816. IEEE Press, New York (2008)"},{"volume-title":"An Overview of Artificial Immune Systems and Their Applications","year":"1998","key":"21_CR3","unstructured":"Dasgupta, D. (ed.): An Overview of Artificial Immune Systems and Their Applications. Springer, Heidelberg (1998)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-85072-4_10","volume-title":"Artificial Immune Systems","author":"R. Fanelli","year":"2008","unstructured":"Fanelli, R.: A Hybrid Model for Immune Inspired Network Intrusion Detection. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 107\u2013118. Springer, Heidelberg (2008)"},{"key":"21_CR5","unstructured":"Fanelli, R.: Network Threat Detection Utilizing Adaptive and Innate Immune System Metaphors. Dissertation, University of Hawaii (2008)"},{"issue":"10","key":"21_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"21_CR7","unstructured":"Galstad, E.: Nagios Home Page, \n                    \n                      http:\/\/www.nagios.org"},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1162\/1063656054088503","volume":"13","author":"M. Glickman","year":"2005","unstructured":"Glickman, M., Balthrop, J., Forrest, S.: A Machine Learning Evaluation of an Artificial Immune System. Evolutionary Computation Journal\u00a013(2), 179\u2013212 (2005)","journal-title":"Evolutionary Computation Journal"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Aickelin, U.: Dendritic Cells for SYN Scan Detection. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2007), London, pp. 49\u201356 (2007)","DOI":"10.1145\/1276958.1276966"},{"key":"21_CR11","unstructured":"Haines, J.W., et al.: 1999 DARPA Intrusion Detection Evaluation: Design and Procedures, TR-1062, Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA (2001)"},{"issue":"4","key":"21_CR12","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S.A. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture for an Artificial Immune System. IEEE Transactions on Evolutionary Computation\u00a08(4), 443\u2013473 (2000)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"21_CR13","volume-title":"Immunobiology","author":"C.A. Janeway","year":"2005","unstructured":"Janeway, C.A.: Immunobiology, 6th edn. Garland Science, New York (2005)","edition":"6"},{"key":"21_CR14","unstructured":"Kim, J., Bentley, P.: Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. In: Proceedings of the 2001 Congress on Evolutionary Computation (CEC 2001), Seoul, pp. 1244\u20131252 (2002)"},{"key":"21_CR15","unstructured":"Kim, J.W., et al.: Malicious Code Execution Detection and Response Immune System Inspired by the Danger Theory. In: Proceedings of the Adaptive and Resilient Computing Security Workshop (ARCS 2005), Santa Fe, NM (2005)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","volume-title":"Recent Advances in Intrusion Detection","author":"M.V. Mahoney","year":"2003","unstructured":"Mahoney, M.V., Chan, P.K.: An Analysis of the 1999 DARPA\/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 220\u2013237. Springer, Heidelberg (2003)"},{"key":"21_CR17","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, Danger, and the Extended Family. Annual Review of Immunology\u00a012, 991\u20131045 (1994)","journal-title":"Annual Review of Immunology"},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1038\/ni0107-11","volume":"8","author":"P. Matzinger","year":"2007","unstructured":"Matzinger, P.: Friendly and dangerous signals: is the tissue in control? Nature Immunology\u00a08(1), 11\u201313 (2007)","journal-title":"Nature Immunology"},{"issue":"4","key":"21_CR19","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J.. McHugh","year":"2000","unstructured":"McHugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"21_CR20","unstructured":"Metasploit LLC: The Metasploit Project, \n                    \n                      http:\/\/www.metasploit.com\/"},{"key":"21_CR21","unstructured":"MITRE Corp: Common Vulnerabilities and Exposures - CVE-2007-1748, \n                    \n                      http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2007-1748"},{"key":"21_CR22","volume-title":"Fundamental Immunology","author":"W.E. Paul","year":"1998","unstructured":"Paul, W.E.: Fundamental Immunology, 4th edn. Lippincott Williams & Wilkins, Philadelphia (1998)","edition":"4"},{"key":"21_CR23","unstructured":"Sangster, B., et al.: Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets. In: USENIX Security\u2019s Workshop on Cyber Security Experimentation and Test, CSET (2009)"},{"key":"21_CR24","unstructured":"Sourcefire Inc: Snort - The Open Source Network Intrusion Detection System, \n                    \n                      http:\/\/www.snort.org"},{"key":"21_CR25","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/CEC.2005.1554799","volume-title":"Proceedings of the 2005 IEEE Congress on Evolutionary Computation","author":"T. Stibor","year":"2005","unstructured":"Stibor, T., Timmis, J., Eckert, C.: On the Appropriateness of Negative Selection Defined Over Hamming Shape-Space as a Network Intrusion Detection System. In: Proceedings of the 2005 IEEE Congress on Evolutionary Computation, pp. 995\u20131002. IEEE Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14547-6_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:33:09Z","timestamp":1619785989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14547-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145469","9783642145476"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14547-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}