Articulation and Clarification of the Dendritic Cell Algorithm
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.
Keywordsdendritic cells artificial immune systems anomaly detection
Unable to display preview. Download preview PDF.
- 5.Greensmith, J., Twycross, J., Aickelin, U.: Artificial dcs for anomaly detection. In: Congress on Evolutionary Computation, page TBA (2006)Google Scholar
- 6.Hofmeyr, S.: An immunological model of distributed detection and its application to computer security. Ph.D thesis, University Of New Mexico (1999)Google Scholar
- 7.Kim, J., Wilson, W., Aickelin, U., McLeod, J.: Cooperative automated worm response and detection immune algorithm (cardinal) inspired by t-cell immunity and tolerance. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239. Springer, Heidelberg (2004)Google Scholar
- 11.Twycross, J., Aickelin, U.: libtissue - implementing innate immunity. In: Congress on Evolutionary Computation (CEC 2006), page TBA (2006)Google Scholar