Information fusion for anomaly detection with the dendritic cell algorithm

被引:68
|
作者
Greensmith, Julie [1 ]
Aickelin, Uwe [1 ]
Tedesco, Gianni [1 ]
机构
[1] Univ Nottingham, Sch Comp Sci, Nottingham NG8 1BB, England
基金
英国工程与自然科学研究理事会;
关键词
Dendritic cells; Data fusion; Immune system; Anomaly detection; Port scans; DANGER; APOPTOSIS; SENSE;
D O I
10.1016/j.inffus.2009.04.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a dendritic cell algorithm based on the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the dendritic cell algorithm is successful at detecting port scans. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:21 / 34
页数:14
相关论文
共 50 条
  • [31] Facial Target Detection and Recognition Algorithm Based on Information Fusion
    Yang, Huayong
    Zhang, Huali
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1421 - 1424
  • [32] Research on Object Detection Algorithm Based on Multilayer Information Fusion
    Chen, Bao-Yuan
    Shen, Yu-Kun
    Sun, Kun
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [33] Denial of Service Attack Detection using Dendritic Cell Algorithm
    Igbe, Obinna
    Ajayi, Oluwaseyi
    Saadawi, Tarek
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 294 - 299
  • [34] The Dendritic Cell Algorithm Optimized by Chemokine Simulator in Spyware Detection
    Yuan, Jie
    Tan, Chengyu
    Chen, Yuxi
    Xiao, Yue
    Gu, Yichun
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1012 - 1016
  • [35] Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware Detection
    Fu, Jun
    Yang, Huan
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 2, 2012, : 18 - 22
  • [36] Microscopic Cell Segmentation by Parallel Detection and Fusion Algorithm
    Cheng, Eric Dahai
    Challa, Subhash
    Chakravorty, Rajib
    Markham, John
    2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, 2008, : 94 - 100
  • [37] Research of K-MEANS Algorithm based on Information Entropy in Anomaly Detection
    Li Han
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 71 - 74
  • [38] Robust anomaly detection in urban environments using sensor and information fusion and a camera network
    Andersson, Maria
    Hemstrom, Fredrik
    Molin, Sara
    COUNTERTERRORISM, CRIME FIGHTING, FORENSICS, AND SURVEILLANCE TECHNOLOGIES II, 2018, 10802
  • [39] Dam safety assessment through data-level anomaly detection and information fusion
    Zhou, Yuhang
    Shu, Xiaosong
    Bao, Tengfei
    Li, Yangtao
    Zhang, Kang
    STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL, 2023, 22 (03): : 2002 - 2021
  • [40] Time series anomaly detection based on multi-scale feature information fusion
    Heng, Hongjun
    Yu, Longwei
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (03): : 203 - 214