2005
DOI: 10.2139/ssrn.2832002
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Automated Worm Response and Detection ImmuNe ALgorithm (CARDINAL) Inspired by T-Cell Immunity and Tolerance

Abstract: Abstract. The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 18 publications
(23 citation statements)
references
References 11 publications
0
23
0
Order By: Relevance
“…Related work by Greensmith et al [5] employed DCs within AIS that coordinated T-cell immune responses. Kim et al [11] continued Greensmith et al's work by discussing T-cell immunity and tolerance for computer worm detection. This work presented how three different processes within the function of T-cells, namely T-cell maturation, differentiation and proliferation could be embedded within the Danger Theory-based AIS.…”
Section: Previous Workmentioning
confidence: 94%
See 1 more Smart Citation
“…Related work by Greensmith et al [5] employed DCs within AIS that coordinated T-cell immune responses. Kim et al [11] continued Greensmith et al's work by discussing T-cell immunity and tolerance for computer worm detection. This work presented how three different processes within the function of T-cells, namely T-cell maturation, differentiation and proliferation could be embedded within the Danger Theory-based AIS.…”
Section: Previous Workmentioning
confidence: 94%
“…The second stage of the job involves sending immune cells and signals between the nodes of the sensor network. This may be performed by a different immune inspired algorithm such as the one introduced in [11]. This paper focuses on the first stage.…”
Section: Using the DC Algorithm To Detect Interest Cache Poisoningmentioning
confidence: 99%
“…The TLRA was deployed in the libtissue framework to detect process anomaly [267,268,269]. Kim et al in [177] emulated interactions between DCs and T cells in the CARDINAL (Cooperative Automated worm Response and Detection ImmuNe ALgorithm), too. However, T cells in CARDINAL will differentiate into various effector T cells, such as helper T cells and cytotoxic T cells.…”
Section: Danger Theorymentioning
confidence: 99%
“…Self and nonself [15], [129], [127], [130], [125], [128], [126], [176], [258] T Cells and Dendritic Cells TLR Algorithm Self [177], [267], [269], [157], [268] a a…”
Section: Algorithmmentioning
confidence: 99%
“…During the past decade, the artificial immune networks have been successfully applied to a large variety of engineering areas, such as data mining [32], time series prediction, pattern recognition [33], optimization, fault detection [30], computer security [31], and process control. In this section, a few examples of these applications are demonstrated and discussed.…”
Section: Applications Of Artificial Immune Networkmentioning
confidence: 99%