Dendritic cell algorithm applied to ping scan investigation revisited: detection quality and performance analysis

dc.creatorGuilherme Costa Silva
dc.creatorWalmir Matos Caminhas
dc.creatorLuciano de Errico
dc.date.accessioned2025-04-02T14:13:44Z
dc.date.accessioned2025-09-09T01:06:30Z
dc.date.available2025-04-02T14:13:44Z
dc.date.issued2017
dc.identifier.doihttps://doi.og/10.1109/TETCI.2017.2721449
dc.identifier.issn2471-285X
dc.identifier.urihttps://hdl.handle.net/1843/81217
dc.languageeng
dc.publisherUniversidade Federal de Minas Gerais
dc.relation.ispartofIEEE Transactions on emerging topics in computational intelligence
dc.rightsAcesso Restrito
dc.subjectAprendizado do computador
dc.subjectInteligência artificial
dc.subject.otherAlgorithm design and analysis , Immune system , Signal processing algorithms , Intrusion detection , Computational intelligence , Ports (Computers)
dc.subject.otherArtificial immune systems , dendritic cell algorithm , intrusion detection , ping scan investigation
dc.subject.otherDigital Networks , Detection Capability , Anomaly Detection , False Positive , False Negative , Support Vector Machine , False Positive Rate , Normal Process , Input Signal , Adaptive Algorithm , Normal Operation , False Negative Rate , Apoptotic Signaling , Intrusion Detection , Knowledge Extraction , Real-time Simulation , Immune Responses In Models , Attack Scenarios , Intrusion Detection System , Classical Version , Deterministic Version , Normal Scenario , Mixed Scenario , Cohen’s Kappa , Scanning Process , Computational Intelligence , Performance Metrics , Suppression Of Immune Responses
dc.titleDendritic cell algorithm applied to ping scan investigation revisited: detection quality and performance analysis
dc.typeArtigo de periódico
local.citation.epage247
local.citation.issue4
local.citation.spage236
local.citation.volume1
local.description.resumoThe dendritic cell algorithm is an immune inspired method based on the danger model, which relies on cell interactions to antigens and signals, considering the correlation between both events, to solve anomaly detection problems. Starting with new datasets, comprising ping scans and file transfers in computer networks, this paper proposes improvements in the algorithm test methodology and qualitative analysis. Results measurement, detection capability, and performance evaluation are explored and discussed, including a real-time analysis and a comparison with similar approaches. Concluding, the study discusses advantages and limitations of the studied approach, suggesting possible improvements and new applications.
local.publisher.countryBrasil
local.publisher.departmentENG - DEPARTAMENTO DE ENGENHARIA ELETRÔNICA
local.publisher.initialsUFMG
local.url.externahttps://ieeexplore.ieee.org/document/8006369

Arquivos

Licença do pacote

Agora exibindo 1 - 1 de 1
Carregando...
Imagem de Miniatura
Nome:
License.txt
Tamanho:
1.99 KB
Formato:
Plain Text
Descrição: