DCA for bot detection
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and t...
| Main Authors: | Al-Hammadi, Yousof, Aickelin, Uwe, Greensmith, Julie |
|---|---|
| Format: | Book Section |
| Published: |
IEEE
2008
|
| Online Access: | https://eprints.nottingham.ac.uk/982/ |
Similar Items
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
Detecting bots based on keylogging activities
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
Behavioural correlation for detecting P2P bots
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
Dendritic Cells for SYN Scan Detection
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
SmiDCA: Smishing attack detection for mobile computing on smishing dataset
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
The effectiveness of DCA:summary and critiques of the literature review
by: Chen, Kun
Published: (2007)
by: Chen, Kun
Published: (2007)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Artificial dendritic cells: multi-faceted perspectives
by: Greensmith, Julie, et al.
Published: (2009)
by: Greensmith, Julie, et al.
Published: (2009)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
The effectiveness of the performance appraisal system in department of civilaviation (DCA) Kuching, Sarawak
by: Pang, Ching Ching
Published: (2005)
by: Pang, Ching Ching
Published: (2005)
Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
by: Gu, Feng, et al.
Published: (2008)
by: Gu, Feng, et al.
Published: (2008)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
by: Ahmed, Aslam, et al.
Published: (2012)
by: Ahmed, Aslam, et al.
Published: (2012)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
An Agent-based Classification Model
by: Gu, Feng, et al.
Published: (2007)
by: Gu, Feng, et al.
Published: (2007)
Articulation and Clarification of the Dendric Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Similar Items
-
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010) -
Detecting bots based on keylogging activities
by: Al-Hammadi, Yousof, et al.
Published: (2008) -
Behavioural correlation for detecting P2P bots
by: Al-Hammadi, Yousof, et al.
Published: (2010) -
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008) -
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)