{"id":"https://openalex.org/W1565406271","doi":"https://doi.org/10.1007/978-0-387-09655-1_12","title":"Intrusion Detection via Artificial Immune System: a Performance-based Approach","display_name":"Intrusion Detection via Artificial Immune System: a Performance-based Approach","publication_year":2008,"publication_date":"2008-08-19","ids":{"openalex":"https://openalex.org/W1565406271","doi":"https://doi.org/10.1007/978-0-387-09655-1_12","mag":"1565406271"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-09655-1_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-09655-1_12","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09655-1_12.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2013 The International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09655-1_12.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020033482","display_name":"Andrea Visconti","orcid":"https://orcid.org/0000-0001-5689-8575"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Andrea Visconti","raw_affiliation_strings":["Dipartimento di Informatica e Comunicazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica e Comunicazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021028602","display_name":"Nicol\u00f2 Fusi","orcid":"https://orcid.org/0000-0002-4102-0169"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Nicol\u00f3 Fusi","raw_affiliation_strings":["Dipartimento di Informatica e Comunicazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica e Comunicazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002795684","display_name":"Hooman Tahayori","orcid":"https://orcid.org/0000-0003-2152-7760"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Hooman Tahayori","raw_affiliation_strings":["Dipartimento di Scienze dell\u2019Informazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy","Dipartimento di Scienze dell'Informazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze dell\u2019Informazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy","institution_ids":["https://openalex.org/I189158943"]},{"raw_affiliation_string":"Dipartimento di Scienze dell'Informazione, Universit\u00e1 degli Studi di Milano, Via Comelico 39/41, Milano, 20135, Italy","institution_ids":["https://openalex.org/I189158943"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020033482"],"corresponding_institution_ids":["https://openalex.org/I189158943"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.11921744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8516253232955933},{"id":"https://openalex.org/keywords/artificial-immune-system","display_name":"Artificial immune system","score":0.8485844135284424},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7989988327026367},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7067313194274902},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5199031233787537},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.501826286315918},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4291660487651825},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.428158700466156},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37870678305625916},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3590954542160034},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22737735509872437},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07150676846504211}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8516253232955933},{"id":"https://openalex.org/C93768804","wikidata":"https://www.wikidata.org/wiki/Q2518735","display_name":"Artificial immune system","level":2,"score":0.8485844135284424},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7989988327026367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7067313194274902},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5199031233787537},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.501826286315918},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4291660487651825},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.428158700466156},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37870678305625916},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3590954542160034},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22737735509872437},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07150676846504211},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-0-387-09655-1_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-09655-1_12","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09655-1_12.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2013 The International Federation for Information Processing","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-09655-1_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-09655-1_12","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09655-1_12.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2013 The International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1565406271.pdf","grobid_xml":"https://content.openalex.org/works/W1565406271.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1295707","https://openalex.org/W236281116","https://openalex.org/W1554351562","https://openalex.org/W1657880157","https://openalex.org/W1849415316","https://openalex.org/W1941427975","https://openalex.org/W2058657545","https://openalex.org/W2103042216","https://openalex.org/W2107676921","https://openalex.org/W2129860818","https://openalex.org/W2132159317","https://openalex.org/W2152448081","https://openalex.org/W2162853743","https://openalex.org/W2168707268","https://openalex.org/W2186294736","https://openalex.org/W2338717024","https://openalex.org/W2616627863","https://openalex.org/W3122884914","https://openalex.org/W3124930780","https://openalex.org/W3136767761","https://openalex.org/W4245852655"],"related_works":["https://openalex.org/W1987409039","https://openalex.org/W2274379716","https://openalex.org/W1969635302","https://openalex.org/W2183313954","https://openalex.org/W2381869356","https://openalex.org/W2384108410","https://openalex.org/W2540152232","https://openalex.org/W2562838041","https://openalex.org/W2383254572","https://openalex.org/W1006157206"],"abstract_inverted_index":{"In":[0],"this":[1,21],"paper,":[2],"we":[3,23],"discuss":[4],"the":[5,33,36,68,72,98,108,111,118],"design":[6],"and":[7,58,128,130,150],"engineering":[8],"of":[9,35,45,48,74,110,136,145,158],"a":[10,46,78,103,123],"biologically-inspired,":[11],"host-based":[12,167],"intrusion":[13],"detection":[14],"system":[15,69,101,160],"to":[16,76,93],"protect":[17],"computer":[18],"networks.":[19],"To":[20,106],"end,":[22],"have":[24,94],"implemented":[25],"an":[26,114],"Artificial":[27],"Immune":[28],"System":[29],"(AIS)":[30],"that":[31,155],"mimics":[32],"behavior":[34],"biological":[37],"adaptive":[38],"immune":[39,100],"system.":[40],"The":[41,65,152],"proposed":[42],"AIS,":[43],"consists":[44],"number":[47],"running":[49,125],"artificial":[50,99],"white":[51],"blood":[52],"cells,":[53],"which":[54],"search,":[55],"recognize,":[56],"store":[57],"deny":[59],"anomalous":[60,95],"requests":[61],"on":[62,81,117],"individual":[63],"hosts.":[64],"model":[66],"monitors":[67],"through":[70],"analysing":[71],"set":[73],"parameters":[75,90],"provide":[77],"general":[79],"information":[80],"its":[82],"state":[83],"\u2014":[84],"ill":[85],"or":[86],"not.":[87],"When":[88],"some":[89],"are":[91,132],"discovered":[92],"values,":[96],"then":[97],"takes":[102],"proper":[104],"action.":[105],"prove":[107],"effectiveness":[109],"suggested":[112],"model,":[113],"exhaustive":[115],"test":[116,153],"AIS":[119],"is":[120,162],"conducted,":[121],"using":[122],"server":[124],"Apache,":[126],"Mysql":[127],"OpenSSH,":[129],"results":[131],"reported.":[133],"Four":[134],"types":[135],"attacks":[137],"were":[138],"tested:":[139],"remote":[140],"buffer":[141],"overflow,":[142],"Distributed":[143],"Denial":[144],"Service":[146],"(DDOS),":[147],"port":[148],"scanning,":[149],"dictionary-attack.":[151],"proved":[154],"our":[156],"definition":[157],"self/non-self":[159],"components":[161],"quite":[163],"effective":[164],"in":[165],"protecting":[166],"systems.":[168]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
