{"id":"https://openalex.org/W1990840327","doi":"https://doi.org/10.1145/2016039.2016075","title":"Anomaly intrusion detection based upon an artificial immunity model","display_name":"Anomaly intrusion detection based upon an artificial immunity model","publication_year":2011,"publication_date":"2011-03-24","ids":{"openalex":"https://openalex.org/W1990840327","doi":"https://doi.org/10.1145/2016039.2016075","mag":"1990840327"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2016039.2016075","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108295993","display_name":"Yingbing Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I184692499","display_name":"Austin Peay State University","ror":"https://ror.org/05tx3bv88","country_code":"US","type":"education","lineage":["https://openalex.org/I184692499"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yingbing Yu","raw_affiliation_strings":["Austin Peay State University, Clarksville, Tennessee"],"affiliations":[{"raw_affiliation_string":"Austin Peay State University, Clarksville, Tennessee","institution_ids":["https://openalex.org/I184692499"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5108295993"],"corresponding_institution_ids":["https://openalex.org/I184692499"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.617575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":80},"biblio":{"volume":null,"issue":null,"first_page":"121","last_page":"125"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9814,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan-horse","display_name":"Trojan horse","score":0.56257504},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5324833},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.46826914},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.412974}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.76166767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7546728},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.73844904},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.7376971},{"id":"https://openalex.org/C2777337426","wikidata":"https://www.wikidata.org/wiki/Q14639","display_name":"Trojan horse","level":2,"score":0.56257504},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.5455867},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5324833},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.47507733},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.46826914},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.4579983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42174742},{"id":"https://openalex.org/C93768804","wikidata":"https://www.wikidata.org/wiki/Q2518735","display_name":"Artificial immune system","level":2,"score":0.41404647},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.412974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39866203},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10411167},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2016039.2016075","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.63,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1543388142","https://openalex.org/W1627728918","https://openalex.org/W2040470184","https://openalex.org/W2128217000","https://openalex.org/W2129860818","https://openalex.org/W2139716931","https://openalex.org/W2338717024","https://openalex.org/W2622610444","https://openalex.org/W3214373139"],"related_works":["https://openalex.org/W4388256873","https://openalex.org/W3123798765","https://openalex.org/W2392568005","https://openalex.org/W2391754407","https://openalex.org/W2389374504","https://openalex.org/W2385761726","https://openalex.org/W2373151213","https://openalex.org/W2183313954","https://openalex.org/W1969635302","https://openalex.org/W1521189752"],"abstract_inverted_index":{"At":[0],"the":[1,18,34,46,55,101,112,129,145,149,154,166,173,180],"present":[2],"intrusion":[3,181],"detection":[4],"systems":[5,51],"are":[6,40,142],"still":[7],"immature":[8],"and":[9,26,42,53,66,103,151],"cannot":[10],"be":[11,106],"deployed":[12],"as":[13,96],"a":[14,78,90,107,115,123,184],"complete":[15],"defense":[16],"considering":[17],"inability":[19],"to":[20,82,127,147,164],"detect":[21,83,177],"new":[22],"types":[23],"of":[24,33,114,134,137,179],"attacks":[25],"high":[27],"false":[28,187],"alarm.":[29],"A":[30,157],"large":[31],"part":[32],"problem":[35],"is":[36,94,161],"that":[37,172],"current":[38],"techniques":[39],"external,":[41],"not":[43],"internal.":[44],"On":[45],"other":[47],"side,":[48],"natural":[49],"immune":[50],"identify":[52],"protect":[54],"organism":[56],"by":[57],"distinguishing":[58],"between":[59],"self":[60,93],"(i.e.":[61,68],"normal":[62,97],"organisms":[63],"or":[64,70,118],"behaviors)":[65],"non-self":[67,104],"abnormal":[69],"anomalous":[71],"behavior).":[72],"In":[73,89],"this":[74],"paper,":[75],"we":[76],"utilize":[77],"computer":[79,91],"immunology":[80,155],"model":[81,174],"anomaly":[84],"intrusions":[85],"from":[86,132],"new/unknown":[87],"attacks.":[88],"system,":[92],"defined":[95],"behavior":[98,130],"patterns":[99],"in":[100,111],"past,":[102],"might":[105],"masquerader,":[108],"foreign":[109],"code":[110],"form":[113],"virus,":[116],"worm":[117],"Trojan":[119],"horse.":[120],"We":[121],"introduce":[122],"finite":[124],"state":[125],"machine":[126],"build":[128],"profile":[131,146],"sequences":[133,141],"system":[135,160],"calls":[136],"privileged":[138],"processes.":[139],"New":[140],"compared":[143],"with":[144,183],"determine":[148],"\"self\"":[150],"\"non-self\"":[152],"for":[153],"model.":[156],"fuzzy":[158],"interference":[159],"further":[162],"applied":[163],"evaluate":[165],"overall":[167],"threat.":[168],"Experimental":[169],"results":[170],"show":[171],"can":[175],"successfully":[176],"most":[178],"traces":[182],"very":[185],"low":[186],"alarm":[188],"rate.":[189]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1990840327","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2024-12-12T21:07:30.172785","created_date":"2016-06-24"}