Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the function of Dendritic Cells (DCs). DCs are antigen presenting cells and key to the activation of the human immune system, behaviour which has been abstracted to form the Dendritic Cell Algorithm (DCA). In algorithmic terms, individual DCs perform multi-sensor data fusion, asynchronously correlating the fused data signals with a secondary data stream. Aggregate output of a population of cells is analysed and forms the basis of an anomaly detection system. In this paper the DCA is applied to the detection of outgoing port scans using TCP SYN packets. Results show that d...
Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate ...
Anomaly detection in computer networks is a complex task that requires the distinction of normality ...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...
Artificial immune systems have previously been applied to the prob-lem of intrusion detection. The a...
Artificial immune systems, more specifically the negative selection algorithm, have previously been ...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
The proliferation of cyber-attacks is accompanied by an urgent need to develop sophisticated detecti...
Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate ...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
Abstract. The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this ...
The Dendritic Cell Algorithm (DCA) is inspired by the function of the dendritic cells of the human i...
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress th...
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of ano...
Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate ...
Anomaly detection in computer networks is a complex task that requires the distinction of normality ...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...
Artificial immune systems have previously been applied to the problem of intrusion detection. The ai...
Artificial immune systems have previously been applied to the prob-lem of intrusion detection. The a...
Artificial immune systems, more specifically the negative selection algorithm, have previously been ...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
The proliferation of cyber-attacks is accompanied by an urgent need to develop sophisticated detecti...
Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate ...
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adapti...
Abstract. The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this ...
The Dendritic Cell Algorithm (DCA) is inspired by the function of the dendritic cells of the human i...
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress th...
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of ano...
Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate ...
Anomaly detection in computer networks is a complex task that requires the distinction of normality ...
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious use...