Articulation and Clarification of the Dendritic Cell Algorithm

  • Julie Greensmith
  • Uwe Aickelin
  • Jamie Twycross
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4163)

Abstract

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.

Keywords

dendritic cells artificial immune systems anomaly detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection – A review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Bentley, P.J., Greensmith, J., Ujjin, S.: Two ways to grow tissue for artificial immune systems. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 139–152. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Greensmith, J., Twycross, J., Aickelin, U.: Artificial dcs for anomaly detection. In: Congress on Evolutionary Computation, page TBA (2006)Google Scholar
  6. 6.
    Hofmeyr, S.: An immunological model of distributed detection and its application to computer security. Ph.D thesis, University Of New Mexico (1999)Google Scholar
  7. 7.
    Kim, J., Wilson, W., Aickelin, U., McLeod, J.: Cooperative automated worm response and detection immune algorithm (cardinal) inspired by t-cell immunity and tolerance. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239. Springer, Heidelberg (2004)Google Scholar
  8. 8.
    Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology 12, 991–1045 (1994)CrossRefGoogle Scholar
  9. 9.
    Mosmann, T.R., Livingstone, A.M.: Dendritic cells: the immune information management experts. Nature Immunology 5(6), 564–566 (2004)CrossRefGoogle Scholar
  10. 10.
    Twycross, J., Aickelin, U.: Towards a conceptual framework for innate immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 112–125. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Twycross, J., Aickelin, U.: libtissue - implementing innate immunity. In: Congress on Evolutionary Computation (CEC 2006), page TBA (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Julie Greensmith
    • 1
  • Uwe Aickelin
    • 1
  • Jamie Twycross
    • 1
  1. 1.CS&ITUniversity of NottinghamUK

Personalised recommendations