Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm

نویسندگان

  • Julie Greensmith
  • Uwe Aickelin
  • Gianni Tedesco
چکیده

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the Dendritic Cell Algorithm is successful at detecting port scans.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Fusion for Anomaly Detection with the Dendritic Cell Algoritm

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on the functionality of these cells, by modelling the bio...

متن کامل

Optimizing Dendritic Cell Preparation for Fusion with Melanoma Cells

Background: Fusion of dendritic cells (DCs) with melanoma cells could reinforce the antigenicity of tumors as a strategy for the treatment of malignant melanoma. However, the insufficient quantity of DCs and the low fusion efficiency limits the development of such approach. Objective: To define the dosage of the stimulating factors as well as the induction condition for the optimal DCs prepara...

متن کامل

The dendritic cell algorithm

Artificial immune systems are a collection of algorithms inspired by the hu-man immune system. Over the past 15 years, extensive research has been per-formed regarding the application of artificial immune systems to computer secu-rity. However, existing immune-inspired techniques have not performed as wellas expected when applied to the detection of intruders in computer systems...

متن کامل

Separation Between Anomalous Targets and Background Based on the Decomposition of Reduced Dimension Hyperspectral Image

The application of anomaly detection has been given a special place among the different   processings of hyperspectral images. Nowadays, many of the methods only use background information to detect between anomaly pixels and background. Due to noise and the presence of anomaly pixels in the background, the assumption of the specific statistical distribution of the background, as well as the co...

متن کامل

Improving the RX Anomaly Detection Algorithm for Hyperspectral Images using FFT

Anomaly Detection (AD) has recently become an important application of target detection in hyperspectral images. The Reed-Xialoi (RX) is the most widely used AD algorithm that suffers from “small sample size” problem. The best solution for this problem is to use Dimensionality Reduction (DR) techniques as a pre-processing step for RX detector. Using this method not only improves the detection p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Fusion

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2010