Abstract | ||
---|---|---|
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1007/11823940_31 | Clinical Orthopaedics and Related Research |
Keywords | Field | DocType |
detection task,dendritic cell algorithm,recent work,input signal mapping,anomaly detector,computer security,innate immunity,formal description,signal selection,artificial immune systems,anomaly detection,artificial immune system | Anomaly detection,Port scan,Artificial immune system,Dendritic cell algorithm,Computer science,Algorithm,Formal description,Formal specification,Artificial intelligence,Detector,Machine learning,Signal selection | Conference |
Volume | ISSN | ISBN |
4163 | Proceedings of 5th International Conference on Artificial Immune
Systems (ICARIS2006), 404-417, 2006 | 3-540-37749-2 |
Citations | PageRank | References |
55 | 3.29 | 7 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Julie Greensmith | 1 | 624 | 41.87 |
Uwe Aickelin | 2 | 1679 | 153.63 |
Jamie Twycross | 3 | 90 | 7.51 |