DCA as Context (Environment) Sensitive System

Existing immune-inspired techniques have not performed as well as expected when applied to the detection of intruders in computer systems. In nature, dendritic cells function as natural anomaly detection agents, instructing the immune system to respond if stress or damage is detected, it is also a crucial cell in the detection and combination of „signals‟ which provide the immune system with a sense of context. General Terms Dendritic Cell Algorithm (DCA), Security

[1]  Jonathan Timmis,et al.  Artificial immune systems—today and tomorrow , 2007, Natural Computing.

[2]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[3]  N K Jerne,et al.  Towards a network theory of the immune system. , 1973, Annales d'immunologie.

[4]  Jun He,et al.  A hybrid artificial immune system and Self Organising Map for network intrusion detection , 2008, Inf. Sci..

[5]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[6]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[7]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Gerold Schuler,et al.  Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.

[9]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[10]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[11]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: A New Computational Approach , 2002 .

[12]  R. Medzhitov,et al.  The control of adaptive immune responses by the innate immune system. , 2011, Advances in immunology.

[13]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[14]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[15]  Ki-Won Yeom,et al.  Immune-inspired Algorithm for Anomaly Detection , 2007, Computational Intelligence in Information Assurance and Security.

[16]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[17]  Jiawei Han,et al.  Data Mining: Concepts and Techniques, Second Edition , 2006, The Morgan Kaufmann series in data management systems.

[18]  Jamie Paul Twycross,et al.  Integrated innate and adaptive artificial immune systems applied to process anomaly detection , 2007 .

[19]  P. Matzinger,et al.  An innate sense of danger. , 1998, Seminars in immunology.

[20]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..