Abstract
Artificial immune systems (AISs) inspired by the biological immune system have been successfully applied to a number of problem domains including fault tolerance, data mining and computer security. The aim of the research introduces the mechanism of DC-T cell interaction in danger theory into the research of anomaly detection. In danger theory (a recently developed hypothesis in immunology), DCs (Dendritic Cells) within innate immune system are sensitive to changes in concentration of different signals derived from their tissue environment. DCs combine these signals internally to produce their own output signals in combination with related antigens. And then DCs present the “signals-antigens” to T cells in adaptive immune system. The role of T cells is to confirm and assess anomalous situations and then either respond to or tolerance the source of the effect. We extract several key features of the mechanism and map them into the anomaly detection domain, then propose a artificial immune model for anomaly detection. The paper illustrates that the novel approach shows considerable promise for future anomaly detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between AIS and IDS. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Greensmith, J., Aickelin, U., Tedesco, G.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm (01-06-2009), http://www.dangertheory.com/
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Intrusion Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)
Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to AIS. In: 1st International Conference on AIS, pp. 141–148 (2002)
Greensmith, J., Aickelin, U.: Dendritic Cells for Real-Time Anomaly Detection. In: The Workshop on Artificial Immune Systems and Immune System Modelling (AISB 2006), Bristol, UK, pp. 7–8 (2006)
Twycross, J.: Integrated Innate and Adaptive Artificial Immune Systems Applied to Process Anomaly Detection. PhD thesis, University Of Nottingham (2007)
Kim, J., Wilson, W., Aickelin, U., McLeod, J.: Cooperative Automated Worm Response and Detection Immune Algorithm (CARDINAL) inspired by T-cell Immunity and Tolerance. In: The 3rd Int. Conf. on AIS (ICARIS 2005), pp. 168–181 (2005)
Zhang, J., Liang, Y.: A Novel Intrusion Detection Model Based on Danger Theory. In: The IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), Wuhan, China, pp. 867–871 (2008)
Zhang, J., Liang, Y.: A Double Layers Detection for DoS Based on the Danger Theory. In: 2009 International Conference on Computer Modeling and Simulation (ICCMS), Macau, China (accepted, 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, J., Liang, Y. (2009). An Anomaly Detection Immune Model Inspired by the Mechanism of DC- T Cell Interaction. In: Qi, L. (eds) Applied Computing, Computer Science, and Advanced Communication. FCC 2009. Communications in Computer and Information Science, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02342-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-02342-2_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02341-5
Online ISBN: 978-3-642-02342-2
eBook Packages: Computer ScienceComputer Science (R0)