Skip to main content
Article thumbnail
Location of Repository

Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm

By Julie Greensmith, Uwe Aickelin and Gianni Tedesco

Abstract

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they\ud perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on\ud the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the Dendritic Cell Algorithm is successful at detecting port scans

OAI identifier: oai:eprints.nottingham.ac.uk:570
Provided by: Nottingham ePrints

Suggested articles

Citations

  1. (2003). A role for immunology in ”next generation” robot controllers.
  2. (1998). An innate sense of danger.
  3. (2004). An innately interesting decade of research in immunology.
  4. (1989). Approaching the asymptote? evolution and revolution in immunology.
  5. (2000). Architecture for an artificial immune system.
  6. (2006). Articulation and clarification of the dendritic cell algorithm.
  7. (2006). Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm.
  8. (2003). Danger theory: The link between ais and ids.
  9. (2004). Death by design: apoptosis, necrosis and autophagy.
  10. (2002). Decoding the patterns of self and nonself by the innate immune system.
  11. (2006). Dendritic cells for anomaly detection.
  12. (2004). Dendritic cells: the immune information management experts.
  13. (2002). Early detection of internet worm activity by metering icmp destination unreachable messages.
  14. (1997). Emerald: Event monitoring enabling responses to anomalous live disturbances.
  15. (2004). Fast detection of scanning worm infections.
  16. (1996). Grids: A graph-based intrusion detection system for large networks.
  17. (2002). Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? Trends in Immunology,
  18. (2005). Immunobiology:the immune system in health and disease. Garland Science Publishing, 6th edition edition,
  19. (2007). Integrated Innate and Adaptive Artificial Immune Systems Applied to Process Anomaly Detection.
  20. (2005). Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection.
  21. (2006). libtissue - implementing innate immunity.
  22. (2007). Mechanisms of apoptosis induced dc suppression. Submitted to the Journal of Immunology,
  23. (2002). Practical automated detection of stealthy portscans.
  24. (1999). Snort - lightweight intrusion detection for networks.
  25. (2004). Stopping spam by extrusion detection. In
  26. (2004). Tending Adam’s Garden : Evolving the Cognitive Immune Self.
  27. (2002). The danger model: A renewed sense of self.
  28. (2007). The Dendritic Cell Algorithm.
  29. (1994). Tolerance, danger and the extended family.
  30. (2005). Towards a conceptual framework for innate immunity.
  31. (2005). Two ways to grow tissue for artificial immune systems.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.