A dendritic cell algorithm based approach for malicious TCP port scanning detection

Nuha Almasalmeh, Firas Saidi, Zouheir Trabelsi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The proliferation of cyber-attacks brings up an urgent need to develop sophisticated detection tools. Some of these tools are based on algorithms inspired from the Human Immune System (HIS). The Dendritic Cell Algorithm (DCA) is one of such HIS inspired methods, which is based on the Danger model. In the current study, two kinds of DCA algorithms (deterministic and classical DCA) are analyzed in order to detect DoS attacks. Moreover, this paper discusses the enhancement of the DCA algorithm to cover the detection of malicious TCP port scanning. By using different use-cases, the evaluation and results are accumulated to show the efficiency of the DCA algorithm used in the Port scanning detection.

Original languageEnglish
Title of host publication2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages877-882
Number of pages6
ISBN (Electronic)9781538677476
DOIs
Publication statusPublished - Jun 2019
Event15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019 - Tangier, Morocco
Duration: Jun 24 2019Jun 28 2019

Publication series

Name2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019

Conference

Conference15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019
Country/TerritoryMorocco
CityTangier
Period6/24/196/28/19

Keywords

  • Artificial immune systems
  • Dendritic cell algorithm
  • Denial of service
  • Intrusion detection
  • Port scanning

ASJC Scopus subject areas

  • Hardware and Architecture
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A dendritic cell algorithm based approach for malicious TCP port scanning detection'. Together they form a unique fingerprint.

Cite this