CFP last date
20 June 2024
Reseach Article

Auto-Immunity Dendritic Cell Algorithm

by Olubadeji Bukola, Adetunmbi A.O.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 2
Year of Publication: 2016
Authors: Olubadeji Bukola, Adetunmbi A.O.

Olubadeji Bukola, Adetunmbi A.O. . Auto-Immunity Dendritic Cell Algorithm. International Journal of Computer Applications. 137, 2 ( March 2016), 10-17. DOI=10.5120/ijca2016908689

@article{ 10.5120/ijca2016908689,
author = { Olubadeji Bukola, Adetunmbi A.O. },
title = { Auto-Immunity Dendritic Cell Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 2 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-17 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016908689 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:37:15.264039+05:30
%A Olubadeji Bukola
%A Adetunmbi A.O.
%T Auto-Immunity Dendritic Cell Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 2
%P 10-17
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Security of information is of utmost importance to any organization or individual, which depend on computer system or internet for business transaction or source of information or research. Many viruses are able to recognize certain anti-virus software, and respond differently to such software than to programs designed for other purposes. Some viruses go after the databases stored by anti-virus products. Some viruses simply go after anti-virus products, trying to erase them. Immune systems also face this daunting control challenge. On the one hand, they need to minimize damage from pathogens, without wasting energy and resources, but on the other must avoid initiating or perpetuating autoimmune responses. Several preventive measures including identification and authentication, logic access control, audit trails, digital signature and firewalls have been developed for the purpose of information security on system. As a result of inadequacies of these measures intrusion detection was introduced to complement these techniques and hence guarantee full protection of computing resources. Detection system is the process of identifying and detecting unauthorized access or abnormal incursions, actions and events in the system, which provides information for timely counter measures. This paper presents a systematic approach to intrusion detection using artificial immune system (Dendritic Cell) to purging in order to avoid attack subversion and autoimmunity on network. In nature, dendritic cells function as natural anomaly detection agents, instructing the immune system to respond if stress or damage is detected. Dendritic cells are a crucial cell in the detection and combination of ‘signals’ which provide the immune system with a sense of context. The Dendritic Cell Algorithm which is based on an abstract model of dendritic cell behaviour, with the abstraction process performed in close collaboration with immunologists will be used. This algorithm consists of components based on the key properties of dendritic cell behaviour, which involves data fusion and correlation components. In this algorithm, four categories of input signal are used. The DCA algorithm will be validated with a standard machine learning dataset. The validation of the Dendritic Cell Algorithm is performed. This is assessed through the algorithm’s application to the detection of intrusion and classification problems.

  1. Ayara, .M., Timmis, J., de Lemo, .R and Forrest, .S (2005): Immunising automated teller machines. In Proc. of the 4th International Conference on Artificial Immune Systems (ICARIS), LNCS 3627, pages 404–417.
  2. Blake, .C .L., Hettich, .S and Merz C. J. (1998): UCI repository of machine learning databases.
  3. Codd .E. F. (1968): Cellular Automata, academic Press.
  4. Dasgupta (1999): Immunity-based intrusion detection system: a general framework, Proceeding of the 22nd National Information Systems Security Conference (NISSC)”, Arlington, Virgina, pp.147-160.
  5. de Castro, .L and Timmis, .J (2002): Artificial Immune Systems: A New Computational Approach. Springer-Verlag, London. UK.
  6. Gooding, L.R. (1992): Virus proteins that counteract host immune defenses. Cell 71, 5–7
  7. Greensmith .J. and Aickelin .U (2008): The Deterministic Dendritic Cell Algorithm. In Proceedings of the 7th International Conference on Articial Immune Systems (ICARIS), pages 291-303.
  8. Jiawei and Micheline, K.(2006) Data Mining: Concepts and techniques, second edition, Elsevier inc.
  9. Kim J. Bentley P. Aickelin U. Greensmith J. Tedesco G. and Twycross J. (2007): Immune System Approaches to Intrusion Detection - A Review. Natural Computing,6(4):413-466.
  10. Kim J. W. (2002): Integrating Artificial Immune Algorithms for Intrusion Detection. PhD thesis, Department of Computer Science, University College London.
  11. Krakauer, D.C. and Plotkin, J.B. (2005) Principles and parameters of molecular robustness. In Robust Design: A Repertoire of Biological, Ecological, and Engineering Case Studies (Jen, E., ed.), pp. 71–103, Oxford University Press
  12. Krakauer, D.C. (2005) Robustness in biological systems: a provisional taxonomy. In Complex Systems Science in Biomedicine (Deisboeck, T.S. and Kresh, Y., eds), pp. 185–207, Plenum
  13. Lee W. and Stolfo S. J. (1998):Data mining approaches for intrusion detection. In Proceedings of the 7th conference on USENIX Security Symposium.
  14. Matzinger, P. (1998) An innate sense of danger. Semin. Immunol. 10, 399–415
  15. Olubadeji .B and Adetunmbi .A .O (2014): Design principle for overcoming subversion of attack on the network. ICACSET 2014. Conference.
  16. Schmidt-Hempel, P. (2005) :The evolutionary ecology of insect immune defense. Annu. Rev. Immunol. 50, 529–551
  17. Mitchell T. M. (1997): Machine Learning. McGraw-Hill.
  18. Mitchell T. M. (1998): An Introduction to Genetic Algorithms. The MIT Press.
  19. Myerson, R.B. (1987): Mechanism design. In The New Palgrave: Allocation, Information, and Markets (Eatwell, J. et al., eds), pp. 191–206, W.W. Norton & Co.
  20. Scholkopf, .B and Smola, .A .J (2002): Vector Machines, Regularization, Optimization, and Beyond. The MIT Press.
Index Terms

Computer Science
Information Sciences


Dendritic Cell Algorithm (DCA) Security Auto – immune K – means Algorithms