2019 15th International Wireless Communications &Amp; Mobile Computing Conference (IWCMC) 2019
DOI: 10.1109/iwcmc.2019.8766461
|View full text |Cite
|
Sign up to set email alerts
|

A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…The danger theory inspired model in Alaparthy & Morgera (2018) employs several immune inspired mechanisms to perform network attack detection in a wireless sensor network using lowlevel features. The approach in Almasalmeh, Saidi & Trabelsi (2019) compares the performance of the deterministic and stochastic DCA and is aimed to detect malicious port scanning in the transmission control protocol by using a combination of both low-level and high-level features. The work in Elisa, Chao & Yang (2020) performs classification using high-level network features, and proposes a modification of the DCA in order to improve classification in large datasets, while also reducing model overfitting.…”
Section: Related Workmentioning
confidence: 99%
“…The danger theory inspired model in Alaparthy & Morgera (2018) employs several immune inspired mechanisms to perform network attack detection in a wireless sensor network using lowlevel features. The approach in Almasalmeh, Saidi & Trabelsi (2019) compares the performance of the deterministic and stochastic DCA and is aimed to detect malicious port scanning in the transmission control protocol by using a combination of both low-level and high-level features. The work in Elisa, Chao & Yang (2020) performs classification using high-level network features, and proposes a modification of the DCA in order to improve classification in large datasets, while also reducing model overfitting.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [12,13,14,15] are including works have focused on the Artificial immune system (AIS) field which is hot research topic for those issues where security is critical. AIS has most capabilities and give us required motivation to use its methods in some complex problems.…”
Section: Introductionmentioning
confidence: 99%