The Dendritic Cell Algorithm for Intrusion Detection

by   Feng Gu, et al.

As one of the solutions to intrusion detection problems, Artificial Immune Systems (AIS) have shown their advantages. Unlike genetic algorithms, there is no one archetypal AIS, instead there are four major paradigms. Among them, the Dendritic Cell Algorithm (DCA) has produced promising results in various applications. The aim of this chapter is to demonstrate the potential for the DCA as a suitable candidate for intrusion detection problems. We review some of the commonly used AIS paradigms for intrusion detection problems and demonstrate the advantages of one particular algorithm, the DCA. In order to clearly describe the algorithm, the background to its development and a formal definition are given. In addition, improvements to the original DCA are presented and their implications are discussed, including previous work done on an online analysis component with segmentation and ongoing work on automated data preprocessing. Based on preliminary results, both improvements appear to be promising for online anomaly-based intrusion detection.


page 1

page 2

page 3

page 4


Process Mining Algorithm for Online Intrusion Detection System

In this paper, we consider the applications of process mining in intrusi...

Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has ...

A New Intrusion Detection System using the Improved Dendritic Cell Algorithm

The Dendritic Cell Algorithm (DCA) as one of the emerging evolutionary a...

Intrusions in Marked Renewal Processes

We present a probabilistic model of an intrusion in a marked renewal pro...

Performance Analysis of a Foreground Segmentation Neural Network Model

In recent years the interest in segmentation has been growing, being use...

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

The use of artificial immune systems in intrusion detection is an appeal...

NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions

The Host-Based Intrusion Detection Systems (HIDS) are widely used for de...