Abstract

Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time problem of port scan detection. Our results show a significant difference in artificial DC behaviour for an outgoing portscan when compared to behaviour for normal processes.

Highlights

  • Intrusion detection systems (IDS) are a method used in computer security for detection of unauthorised use of machines

  • The Danger Project proposed by Aickelin et al (2003) aims to improve on results previously seen with artificial immune systems (AIS) by applying concepts from the Danger Theory to IDS

  • The exposure of a Dendritic Cells (DCs) to PAMPs, danger or safe signals causes an increase in co-stimulatory molecules (CSM) on the DC

Read more

Summary

Introduction

Intrusion detection systems (IDS) are a method used in computer security for detection of unauthorised use of machines. As immature DCs, they collect multiple antigens and are exposed to signals, derived from dying cells in the tissue (safe or danger signals). DCs can combine these signals with bacterial signatures (PAMPs) to generate different output concentrations of costimulatory molecules, semi-mature cytokines and mature cytokines. Exposure to signals generates an increase in co-stimulatory molecules and causes the maturation of a DC to two different states: mature and semi-mature. PAMPs, based on a pre-defined signature, and danger signals (released on damage to the tissue) cause an increase in mature DC cytokines. Safe signals cause an increase in semi-mature DC cytokines and have a suppressive effect on both PAMPs and danger signals. The exposure of a DC to PAMPs, danger or safe signals causes an increase in co-stimulatory molecules (CSM) on the DC. A mean percentage mature antigen value can be calculated, indicating the number of times an antigen was presented in a mature context

Port Scan Experiment
Results and Analysis
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.