Dendritic cell algorithm applied to ping scan investigation revisited: detection quality and performance analysis
| dc.creator | Guilherme Costa Silva | |
| dc.creator | Walmir Matos Caminhas | |
| dc.creator | Luciano de Errico | |
| dc.date.accessioned | 2025-04-02T14:13:44Z | |
| dc.date.accessioned | 2025-09-09T01:06:30Z | |
| dc.date.available | 2025-04-02T14:13:44Z | |
| dc.date.issued | 2017 | |
| dc.identifier.doi | https://doi.og/10.1109/TETCI.2017.2721449 | |
| dc.identifier.issn | 2471-285X | |
| dc.identifier.uri | https://hdl.handle.net/1843/81217 | |
| dc.language | eng | |
| dc.publisher | Universidade Federal de Minas Gerais | |
| dc.relation.ispartof | IEEE Transactions on emerging topics in computational intelligence | |
| dc.rights | Acesso Restrito | |
| dc.subject | Aprendizado do computador | |
| dc.subject | Inteligência artificial | |
| dc.subject.other | Algorithm design and analysis , Immune system , Signal processing algorithms , Intrusion detection , Computational intelligence , Ports (Computers) | |
| dc.subject.other | Artificial immune systems , dendritic cell algorithm , intrusion detection , ping scan investigation | |
| dc.subject.other | Digital Networks , Detection Capability , Anomaly Detection , False Positive , False Negative , Support Vector Machine , False Positive Rate , Normal Process , Input Signal , Adaptive Algorithm , Normal Operation , False Negative Rate , Apoptotic Signaling , Intrusion Detection , Knowledge Extraction , Real-time Simulation , Immune Responses In Models , Attack Scenarios , Intrusion Detection System , Classical Version , Deterministic Version , Normal Scenario , Mixed Scenario , Cohen’s Kappa , Scanning Process , Computational Intelligence , Performance Metrics , Suppression Of Immune Responses | |
| dc.title | Dendritic cell algorithm applied to ping scan investigation revisited: detection quality and performance analysis | |
| dc.type | Artigo de periódico | |
| local.citation.epage | 247 | |
| local.citation.issue | 4 | |
| local.citation.spage | 236 | |
| local.citation.volume | 1 | |
| local.description.resumo | The dendritic cell algorithm is an immune inspired method based on the danger model, which relies on cell interactions to antigens and signals, considering the correlation between both events, to solve anomaly detection problems. Starting with new datasets, comprising ping scans and file transfers in computer networks, this paper proposes improvements in the algorithm test methodology and qualitative analysis. Results measurement, detection capability, and performance evaluation are explored and discussed, including a real-time analysis and a comparison with similar approaches. Concluding, the study discusses advantages and limitations of the studied approach, suggesting possible improvements and new applications. | |
| local.publisher.country | Brasil | |
| local.publisher.department | ENG - DEPARTAMENTO DE ENGENHARIA ELETRÔNICA | |
| local.publisher.initials | UFMG | |
| local.url.externa | https://ieeexplore.ieee.org/document/8006369 |
Arquivos
Licença do pacote
1 - 1 de 1