{"title":"基于树突状细胞算法的恶意TCP端口扫描检测方法","authors":"Nuha Almasalmeh, Firas Saidi, Z. Trabelsi","doi":"10.1109/IWCMC.2019.8766461","DOIUrl":null,"url":null,"abstract":"The proliferation of cyber-attacks brings up an urgent need to develop sophisticated detection tools. Some of these tools are based on algorithms inspired from the Human Immune System (HIS). The Dendritic Cell Algorithm (DCA) is one of such HIS inspired methods, which is based on the Danger model. In the current study, two kinds of DCA algorithms (deterministic and classical DCA) are analyzed in order to detect DoS attacks. Moreover, this paper discusses the enhancement of the DCA algorithm to cover the detection of malicious TCP port scanning. By using different use-cases, the evaluation and results are accumulated to show the efficiency of the DCA algorithm used in the Port scanning detection.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning Detection\",\"authors\":\"Nuha Almasalmeh, Firas Saidi, Z. Trabelsi\",\"doi\":\"10.1109/IWCMC.2019.8766461\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The proliferation of cyber-attacks brings up an urgent need to develop sophisticated detection tools. Some of these tools are based on algorithms inspired from the Human Immune System (HIS). The Dendritic Cell Algorithm (DCA) is one of such HIS inspired methods, which is based on the Danger model. In the current study, two kinds of DCA algorithms (deterministic and classical DCA) are analyzed in order to detect DoS attacks. Moreover, this paper discusses the enhancement of the DCA algorithm to cover the detection of malicious TCP port scanning. By using different use-cases, the evaluation and results are accumulated to show the efficiency of the DCA algorithm used in the Port scanning detection.\",\"PeriodicalId\":363800,\"journal\":{\"name\":\"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCMC.2019.8766461\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCMC.2019.8766461","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning Detection
The proliferation of cyber-attacks brings up an urgent need to develop sophisticated detection tools. Some of these tools are based on algorithms inspired from the Human Immune System (HIS). The Dendritic Cell Algorithm (DCA) is one of such HIS inspired methods, which is based on the Danger model. In the current study, two kinds of DCA algorithms (deterministic and classical DCA) are analyzed in order to detect DoS attacks. Moreover, this paper discusses the enhancement of the DCA algorithm to cover the detection of malicious TCP port scanning. By using different use-cases, the evaluation and results are accumulated to show the efficiency of the DCA algorithm used in the Port scanning detection.