Practical automated detection of stealthy portscans
Journal of Computer Security
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Architecture for an Artificial Immune System
Evolutionary Computation
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Towards a conceptual framework for innate immunity
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Two ways to grow tissue for artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
The Deterministic Dendritic Cell Algorithm
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Artificial Immune Systems and Kernel Methods
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
On the Relevance of Cellular Signaling Pathways for Immune-Inspired Algorithms
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
Multiagent-based dendritic cell algorithm with applications in computer security
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
An engineering-informed modelling approach to AIS
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
The danger theory applied to vegetal image pattern classification
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Improving the generalization capability of hybrid immune detector maturation algorithm
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part I
A negative selection approach to intrusion detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hi-index | 0.00 |
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a dendritic cell algorithm based on the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the dendritic cell algorithm is successful at detecting port scans.