Abstract
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection – A review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)
Bentley, P.J., Greensmith, J., Ujjin, S.: Two ways to grow tissue for artificial immune systems. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 139–152. Springer, Heidelberg (2005)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)
Greensmith, J., Twycross, J., Aickelin, U.: Artificial dcs for anomaly detection. In: Congress on Evolutionary Computation, page TBA (2006)
Hofmeyr, S.: An immunological model of distributed detection and its application to computer security. Ph.D thesis, University Of New Mexico (1999)
Kim, J., Wilson, W., Aickelin, U., McLeod, J.: Cooperative automated worm response and detection immune algorithm (cardinal) inspired by t-cell immunity and tolerance. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239. Springer, Heidelberg (2004)
Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology 12, 991–1045 (1994)
Mosmann, T.R., Livingstone, A.M.: Dendritic cells: the immune information management experts. Nature Immunology 5(6), 564–566 (2004)
Twycross, J., Aickelin, U.: Towards a conceptual framework for innate immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 112–125. Springer, Heidelberg (2005)
Twycross, J., Aickelin, U.: libtissue - implementing innate immunity. In: Congress on Evolutionary Computation (CEC 2006), page TBA (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Greensmith, J., Aickelin, U., Twycross, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds) Artificial Immune Systems. ICARIS 2006. Lecture Notes in Computer Science, vol 4163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11823940_31
Download citation
DOI: https://doi.org/10.1007/11823940_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37749-8
Online ISBN: 978-3-540-37751-1
eBook Packages: Computer ScienceComputer Science (R0)