{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:37:25Z","timestamp":1773668245260,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,12,25]],"date-time":"2013-12-25T00:00:00Z","timestamp":1387929600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s12065-013-0101-3","type":"journal-article","created":{"date-parts":[[2013,12,24]],"date-time":"2013-12-24T16:21:13Z","timestamp":1387902073000},"page":"135-156","source":"Crossref","is-referenced-by-count":20,"title":["A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks"],"prefix":"10.1007","volume":"6","author":[{"given":"Mahdi","family":"Mohammadi","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Akbari","sequence":"additional","affiliation":[]},{"given":"Bijan","family":"Raahemi","sequence":"additional","affiliation":[]},{"given":"Babak","family":"Nassersharif","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Asgharian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,25]]},"reference":[{"key":"101_CR1","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","volume":"177","author":"T Shon","year":"2007","unstructured":"Shon T, Moon J (2007) A hybrid machine learning approach to network anomaly detection. Inf Sci 177:3799\u20133821","journal-title":"Inf Sci"},{"key":"101_CR2","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"Z Zhou","year":"2010","unstructured":"Zhou Z, Leckie C, Karunasekera S (2010) A survey of coordinated attacks and collaborative intrusion detection. Comput Security 29:124\u2013140","journal-title":"Comput Security"},{"key":"101_CR3","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Teodoro","year":"2009","unstructured":"Teodoro P, Verdejo J, Fernandez G, Va\u2032zquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secuity 28:18\u201328","journal-title":"Comput Secuity"},{"key":"101_CR4","unstructured":"Axelsson S (1999) Research in intrusion detection systems: a survey. Technical Report TR 98-17. Chalmers University of Technology, Goteborg, Sweden"},{"issue":"7\u20138","key":"101_CR5","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BF02994844","volume":"55","author":"H Debar","year":"2000","unstructured":"Debar H, Dacier M, Wespi A (2000) A revised taxonomy for intrusion detection systems. Ann T\u00e9l\u00e9commun 55(7\u20138):361\u2013378","journal-title":"Ann T\u00e9l\u00e9commun"},{"key":"101_CR6","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.cose.2008.06.002","volume":"27","author":"W Masri","year":"2008","unstructured":"Masri W, Podgurski A (2008) Application-based anomaly intrusion detection with dynamic information flow analysis. Comput Security 27:176\u2013187","journal-title":"Comput Security"},{"key":"101_CR7","doi-asserted-by":"crossref","unstructured":"Twycross J, Aickelin U (2006) Libtissue\u2014implementing innate immunity. In: Aickelin U (ed) Proceedings of the IEEE congress on evolutionary, computation (CEC\u201906). Vancouver, Canada, pp 16\u201321","DOI":"10.1109\/CEC.2006.1688351"},{"key":"101_CR8","doi-asserted-by":"crossref","unstructured":"Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative ais framework for intrusion detection. In: IEEE international conference on communications (ICC\u201907), Glasgow, Scotland, 4\u201328 June 2007, pp 1409\u20131416","DOI":"10.1109\/ICC.2007.237"},{"key":"101_CR9","unstructured":"Kim J (2003) Integrating artificial immune algorithms for intrusion detection, PhD Thesis, Department of Computer Science, University College London"},{"key":"101_CR10","unstructured":"Kim J, Bentley P (2002) Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Fogel DB, El-Sharkawi MA, Yao X, Greenwood G, Iba H, Marrow P, Shackleton M (eds) Proceedings of the IEEE congress on evolutionary computation (CEC\u201902), vol 2, Honolulu, HI, USA, 12\u201317 May 2002. IEEE Press, pp 1015\u20131020"},{"key":"101_CR11","first-page":"1226","volume-title":"AI 2004: advances in artificial intelligence, volume 3339 of lecture notes in computer science","author":"F Liu","year":"2004","unstructured":"Liu F, Qu B, Chen R (2004) Intrusion detection based on immune clonal selection algorithms. In: Webb GI, Yu X (eds) AI 2004: advances in artificial intelligence, volume 3339 of lecture notes in computer science. Springer, Berlin, pp 1226\u20131232"},{"key":"101_CR12","unstructured":"Xian J, Lang F, Tang X (2005) A novel intrusion detection method based on clonal selection clustering algorithm. In: Proceedings of 2005 international conference on machine learning and cybernetics, vol 6, 18\u201321 August 2005, pp 3905\u20133910"},{"issue":"7","key":"101_CR13","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N Ye","year":"2002","unstructured":"Ye N, Emran S, Chen Q, Vilbert S (2002) Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans Comput 51(7):810\u2013820","journal-title":"IEEE Trans Comput"},{"key":"101_CR14","volume-title":"Knowledge-based systems","author":"R Kerkar","year":"2009","unstructured":"Kerkar R, Srinivas S (2009) Knowledge-based systems. Jones & Bartlett Publishers, Sudbury"},{"key":"101_CR15","first-page":"407","volume":"3506","author":"K Burbeck","year":"2004","unstructured":"Burbeck K, Tehrani A (2004) Adwice\u2014anomaly detection with real-time incremental clustering. Inf Security Cryptol 3506:407\u2013424","journal-title":"Inf Security Cryptol"},{"key":"101_CR16","first-page":"7","volume":"2","author":"B Borah","year":"2008","unstructured":"Borah B, Bhattacharyya D (2008) Catsub: a technique for clustering categorical data based on subspace. J Comput Sci 2:7\u201320","journal-title":"J Comput Sci"},{"key":"101_CR17","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan L, Awad M, Thuraisingham B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. Int J Very Large Data Bases 16:507\u2013552","journal-title":"Int J Very Large Data Bases"},{"issue":"3","key":"101_CR18","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TKDE.2007.44","volume":"19","author":"S Gaddam","year":"2007","unstructured":"Gaddam S, Phoha V, Balagani K (2007) K-means\u00a0+\u00a0id3: a novel method for supervised anomaly detection by cascading k-means clustering and id3 decision tree learning methods. IEEE Trans Knowl Data Eng 19(3):345\u2013354","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"101_CR19","volume-title":"Adaptation in natural and artificial systems","author":"J Holland","year":"1975","unstructured":"Holland J (1975) Adaptation in natural and artificial systems. University of Michigan Press, Ann Arbor"},{"issue":"1","key":"101_CR20","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1111\/j.1540-5915.1977.tb01074.x","volume":"8","author":"F Glover","year":"1977","unstructured":"Glover F (1977) Heuristic for integer programming using surrogate constraints. Decis Sci 8(1):156\u2013166","journal-title":"Decis Sci"},{"key":"101_CR21","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick S, Gelatt C, Vecchi M (1983) Optimization by simulated annealing. Science 220:671\u2013680","journal-title":"Science"},{"key":"101_CR22","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.ins.2011.11.032","volume":"189","author":"M Mohammadi","year":"2011","unstructured":"Mohammadi M, Raahemi R, Akbari A, Nassersharif B, Moeinzadeh H (2011) Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms. Inf Sci 189:219\u2013232","journal-title":"Inf Sci"},{"issue":"1","key":"101_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.artmed.2011.03.001","volume":"52","author":"W Zhao","year":"2011","unstructured":"Zhao W, Davis W (2011) A modified artificial immune system based pattern recognition approach an application to clinical diagnostics. Artif Intell Med 52(1):1\u20139","journal-title":"Artif Intell Med"},{"issue":"11","key":"101_CR24","doi-asserted-by":"crossref","first-page":"2186","DOI":"10.1016\/j.patcog.2006.05.028","volume":"39","author":"K Polat","year":"2006","unstructured":"Polat K, G\u00fcne\u015f S, Tosun S (2006) Diagnosis of heart disease using artificial immune recognition system and fuzzy weighted pre-processing. Pattern Recogn 39(11):2186\u20132193","journal-title":"Pattern Recogn"},{"key":"101_CR25","unstructured":"Zhou J, Dasgupta D (2004) Real-valued negative selection algorithm with variable-sized detectors, LNCS 3102. In: Proceedings of GECCO, pp 287\u2013298"},{"issue":"5","key":"101_CR26","doi-asserted-by":"crossref","first-page":"5947","DOI":"10.1016\/j.eswa.2010.11.028","volume":"38","author":"V Bol\u00f3n-Canedo","year":"2011","unstructured":"Bol\u00f3n-Canedo V, S\u00e1nchez-Maro\u00f1o N, Betanzos A (2011) Feature selection and classification in multiple class datasets: an application to KDDCup99 dataset. Expert Syst Appl 38(5):5947\u20135957","journal-title":"Expert Syst Appl"},{"issue":"1","key":"101_CR27","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.patcog.2009.05.017","volume":"43","author":"C Tsai","year":"2010","unstructured":"Tsai C, Lin C (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222\u2013229","journal-title":"Pattern Recognit"},{"issue":"10","key":"101_CR28","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1016\/j.comcom.2007.05.002","volume":"30","author":"AN Toosi","year":"2007","unstructured":"Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201\u20132212","journal-title":"Comput Commun"},{"key":"101_CR29","unstructured":"Mahbod T, Ebrahim B, Wei L, Ali AG (2009) A detailed analysis of the KDD CUP 99 data set in proceeding of computational intelligence in security and defense application"},{"key":"101_CR30","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Security 3:262\u2013294","journal-title":"ACM Trans Inf Syst Security"},{"issue":"15","key":"101_CR31","doi-asserted-by":"crossref","first-page":"3531","DOI":"10.1016\/j.comnet.2012.02.019","volume":"56","author":"A Botta","year":"2012","unstructured":"Botta A, Dainotti A, Pescap\u00e8 A (2012) A tool for the generation of realistic network workload for emerging networking scenarios. Comput Netw 56(15):3531\u20133547","journal-title":"Comput Netw"},{"key":"101_CR32","doi-asserted-by":"crossref","unstructured":"Asgharian Z, Asgharian H, Akbari A, Raahemi B (2011) A framework for SIP intrusion detection and response systems. Computer networks and distributed systems (CNDS), pp 100\u2013105","DOI":"10.1109\/CNDS.2011.5764552"},{"key":"101_CR33","doi-asserted-by":"crossref","first-page":"145","DOI":"10.4018\/978-1-60960-836-1.ch006","volume":"6","author":"Z Asgharian","year":"2012","unstructured":"Asgharian Z, Asgharian H, Akbari A, Raahemi B (2012) Detecting denial of service attacks on sip based services and proposing solutions. Intrusion Detect Response Technol Protect Netw 6:145\u2013167","journal-title":"Intrusion Detect Response Technol Protect Netw"},{"key":"101_CR34","doi-asserted-by":"crossref","unstructured":"Nassar M, State R, Festor O (2010) Labeled VoIP data-set for intrusion detection evaluation. Conference on Networked services and applications: engineering, control and management (EUNICE\u201910), pp 97\u2013106","DOI":"10.1007\/978-3-642-13971-0_10"},{"key":"101_CR35","doi-asserted-by":"crossref","unstructured":"Nassar M, State R, Festor O (2008) Monitoring SIP traffic using support vector machines. In: Proceedings of the 11th international symposium on recent advances in intrusion detection (RAID \u201808), pp 311\u2013330","DOI":"10.1007\/978-3-540-87403-4_17"},{"key":"101_CR36","unstructured":"Nassar M, State R, Festor O (2009) VoIP malware: attack tool & attack scenarios, ICC \u201809. IEEE international conference on communications, pp 1\u20136"},{"key":"101_CR37","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"J Dunn","year":"1973","unstructured":"Dunn J (1973) A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters. J Cybern 3:32\u201357","journal-title":"J Cybern"},{"key":"101_CR38","unstructured":"Mohammadi M, Raahemi B, Akbari A. Unsupervised sample reduction using clustering for intrusion detection system. Technical Report, Knowledge Discovery and Data mining Lab. University of Ottawa. http:\/\/web5.uottawa.ca\/www5\/braahemi\/publications.htm\/Sample-Reduction.pdf"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-013-0101-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-013-0101-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-013-0101-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,20]],"date-time":"2022-03-20T15:45:58Z","timestamp":1647791158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-013-0101-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,25]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["101"],"URL":"https:\/\/doi.org\/10.1007\/s12065-013-0101-3","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,25]]}}}