2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) 2017
DOI: 10.1109/cscloud.2017.12
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Datasets. We construct our datasets from several publicly available traces [66], [41], [9], [5], [11], [14]. We filter messages of 10 common protocols from these traces with focus on binary protocols.…”
Section: A Experiments Setupmentioning
confidence: 99%
“…Datasets. We construct our datasets from several publicly available traces [66], [41], [9], [5], [11], [14]. We filter messages of 10 common protocols from these traces with focus on binary protocols.…”
Section: A Experiments Setupmentioning
confidence: 99%
“…In [ 19 ], Igbe et al present an anomaly-based IDS devoted to protecting the DNP3 communications. The proposed IDS is composed of three main blocks, namely (a) packet capture block, (b) preprocessing block and (c) deterministic Dendritic Cell Algorithm (dDCA) signal processing block.…”
Section: Related Work and Contributionsmentioning
confidence: 99%
“…(2)Artificial SIR model contains multiple immune cells; (3)In complex systems, macrophages have many abilities: kill, immunoregulatory properties and antigen presentation;(4)Each cell has complex immune response in its own area, while multiple cells cooperate with each other. The immune response area in biology is spatial.…”
Section: The Artificial Sir Mechanism and Its Applicationsmentioning
confidence: 99%
“…Each immune cell serves as the main part of data mining, and meanwhile the function of exception handling can be ignored. As at present, many artificial immune algorithms based on biological immune mechanism are implemented in intrusion detection in cloud environment [1], intrusion detection in wireless sensor networks [6] and smart grid network attack detection [3], these applications are essentially a classification problem, therefore, considering the manual SIR mechanism, it can also be implemented in these fields.…”
Section: The Artificial Sir Mechanism and Its Applicationsmentioning
confidence: 99%