Skip to main content

An Anomaly Detection Immune Model Inspired by the Mechanism of DC- T Cell Interaction

  • Conference paper
Applied Computing, Computer Science, and Advanced Communication (FCC 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 34))

Included in the following conference series:

  • 673 Accesses

Abstract

Artificial immune systems (AISs) inspired by the biological immune system have been successfully applied to a number of problem domains including fault tolerance, data mining and computer security. The aim of the research introduces the mechanism of DC-T cell interaction in danger theory into the research of anomaly detection. In danger theory (a recently developed hypothesis in immunology), DCs (Dendritic Cells) within innate immune system are sensitive to changes in concentration of different signals derived from their tissue environment. DCs combine these signals internally to produce their own output signals in combination with related antigens. And then DCs present the “signals-antigens” to T cells in adaptive immune system. The role of T cells is to confirm and assess anomalous situations and then either respond to or tolerance the source of the effect. We extract several key features of the mechanism and map them into the anomaly detection domain, then propose a artificial immune model for anomaly detection. The paper illustrates that the novel approach shows considerable promise for future anomaly detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between AIS and IDS. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Greensmith, J., Aickelin, U., Tedesco, G.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm (01-06-2009), http://www.dangertheory.com/

  3. Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Intrusion Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to AIS. In: 1st International Conference on AIS, pp. 141–148 (2002)

    Google Scholar 

  5. Greensmith, J., Aickelin, U.: Dendritic Cells for Real-Time Anomaly Detection. In: The Workshop on Artificial Immune Systems and Immune System Modelling (AISB 2006), Bristol, UK, pp. 7–8 (2006)

    Google Scholar 

  6. Twycross, J.: Integrated Innate and Adaptive Artificial Immune Systems Applied to Process Anomaly Detection. PhD thesis, University Of Nottingham (2007)

    Google Scholar 

  7. Kim, J., Wilson, W., Aickelin, U., McLeod, J.: Cooperative Automated Worm Response and Detection Immune Algorithm (CARDINAL) inspired by T-cell Immunity and Tolerance. In: The 3rd Int. Conf. on AIS (ICARIS 2005), pp. 168–181 (2005)

    Google Scholar 

  8. Zhang, J., Liang, Y.: A Novel Intrusion Detection Model Based on Danger Theory. In: The IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), Wuhan, China, pp. 867–871 (2008)

    Google Scholar 

  9. Zhang, J., Liang, Y.: A Double Layers Detection for DoS Based on the Danger Theory. In: 2009 International Conference on Computer Modeling and Simulation (ICCMS), Macau, China (accepted, 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, J., Liang, Y. (2009). An Anomaly Detection Immune Model Inspired by the Mechanism of DC- T Cell Interaction. In: Qi, L. (eds) Applied Computing, Computer Science, and Advanced Communication. FCC 2009. Communications in Computer and Information Science, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02342-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02342-2_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02341-5

  • Online ISBN: 978-3-642-02342-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics