Skip to main content

Research Repository

Advanced Search

All Outputs (41)

Sensing Danger: Innate Immunology for Intrusion Detection (2007)
Journal Article
Aickelin, U., & Greensmith, J. (2007). Sensing Danger: Innate Immunology for Intrusion Detection. Information Security Technical Report, 12(4), 218-227. https://doi.org/10.1016/j.istr.2007.10.003

The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with l... Read More about Sensing Danger: Innate Immunology for Intrusion Detection.

Articulation and Clarification of the Dendritic Cell Algorithm (2006)
Book Chapter
Greensmith, J., Aickelin, U., & Twycross, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. In Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006. ProceedingsSpringer. https://doi.org/10.1007/11823940_31

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer... Read More about Articulation and Clarification of the Dendritic Cell Algorithm.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. (2005). 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Conference Proceeding
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). Immune System Approaches to Intrusion Detection - A Review (ICARIS). In Artificial Immune Systems: Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004. Proceedings. https://doi.org/10.1007/978-3-540-30220-9_26

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. (2004). Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

'Immune System Approaches to Intrusion Detection - A Review' (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). 'Immune System Approaches to Intrusion Detection - A Review'.

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, s... Read More about 'Immune System Approaches to Intrusion Detection - A Review'.

The Application of a Dendric Cell Algorithm to a Robotic Classifier
Conference Proceeding
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., & Kendall, G. The Application of a Dendric Cell Algorithm to a Robotic Classifier.

The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an invest... Read More about The Application of a Dendric Cell Algorithm to a Robotic Classifier.

Articulation and Clarification of the Dendric Cell Algorithm
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm.

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses, both reac... Read More about Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

An Agent-based Classification Model
Conference Proceeding
Gu, F., Aickelin, U., & Greensmith, J. An Agent-based Classification Model.

The major function of this model is to access the UCI Wisconsin Breast Cancer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classification can be referred as anomaly detection, which discri... Read More about An Agent-based Classification Model.

The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
Journal Article
Greensmith, J., Feyereisl, J., & Aickelin, U. The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms. Evolutionary Intelligence, 1(2), https://doi.org/10.1007/s12065-008-0008-6

The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation which results in a ‘context aware’ detection system. Previous applicat... Read More about The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms.

PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
Conference Proceeding
Gu, F., Greensmith, J., Oates, R., & Aickelin, U. PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm.

As one of the newest members in the field of articial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). Unlike other AIS, the DCA does not rely on training data, instead domain... Read More about PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm.

On the role of the AIS practitioner
Conference Proceeding
Hart, E., Read, M., McEwan, C., Aickelin, U., & Greensmith, J. On the role of the AIS practitioner.

Cognisant of the gulf between engineers and immunologists that currenty hinders a truly inter-disciplinary approach to the field of Artificial Immune Systems (AIS), we propose a redefinition of the term AIS practitioner, as an individual who ident... Read More about On the role of the AIS practitioner.

Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
Conference Proceeding
Ahmed, A., Greensmith, J., & Aickelin, U. Variance in system dynamics and agent based modelling using the SIR model of infectious diseases.

Classical deterministic simulations of epidemiological processes, such as those based on System Dynamics, produce a single result based on a fixed set of input parameters with no variance between simulations. Input parameters are subsequently modifie... Read More about Variance in system dynamics and agent based modelling using the SIR model of infectious diseases.

Integrating real-time analysis with the dendritic cell algorithm through segmentation
Conference Proceeding
Gu, F., Greensmith, J., & Aickelin, U. (in press). Integrating real-time analysis with the dendritic cell algorithm through segmentation.

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusion detection should be performed in real-time, to continuously detect mi... Read More about Integrating real-time analysis with the dendritic cell algorithm through segmentation.