Dendritic Cells for SYN Scan Detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the function of Dendritic Cells (DCs). DCs are antigen presenting cells and key to the activation of the human immune system, be...
| Main Authors: | Greensmith, Julie, Aickelin, Uwe |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Online Access: | https://eprints.nottingham.ac.uk/594/ |
Similar Items
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Artificial dendritic cells: multi-faceted perspectives
by: Greensmith, Julie, et al.
Published: (2009)
by: Greensmith, Julie, et al.
Published: (2009)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
by: Gu, Feng, et al.
Published: (2008)
by: Gu, Feng, et al.
Published: (2008)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Quiet in class: classification, noise and the dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2011)
by: Gu, Feng, et al.
Published: (2011)
The functional dendritic cell algorithm: a formal specification with Haskell
by: Greensmith, Julie, et al.
Published: (2017)
by: Greensmith, Julie, et al.
Published: (2017)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Articulation and Clarification of the Dendric Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
OroSYN
by: Arzmi, Mohd Hafiz
Published: (2019)
by: Arzmi, Mohd Hafiz
Published: (2019)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Cloud denial of service detection by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Computer aided system for dendritic cells detection and counting
by: Muhd Suberi, Anis Azwani
Published: (2017)
by: Muhd Suberi, Anis Azwani
Published: (2017)
An improved artificial dendrite cell algorithm for abnormal signal detection
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2018)
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2018)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
An Agent-based Classification Model
by: Gu, Feng, et al.
Published: (2007)
by: Gu, Feng, et al.
Published: (2007)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
by: Ahmed, Aslam, et al.
Published: (2012)
by: Ahmed, Aslam, et al.
Published: (2012)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
Similar Items
-
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006) -
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006) -
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008) -
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012) -
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)