Multiresolution dendritic cell algorithm for network anomaly detection. Limon-Cantu, D. & Alarcon-Aquino, V. PeerJ Computer Science, 7(e749):1-32, 10, 2021. Paper Website doi abstract bibtex 4 downloads Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, as information systems provide essential services for enterprises and individuals. The consequences of these attacks could be the access, disclosure, or modification of information, as well as denial of computer services and resources. Intrusion Detection Systems (IDS) are developed as solutions to detect anomalous behavior, such as denial of service, and backdoors. The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution Analysis (MRA) Maximal Overlap Discrete Wavelet Transform (MODWT), as well as the segmented deterministic DCA approach (S-dDCA). The proposed approach is a binary classifier that aims to analyze a time-frequency representation of time-series data obtained from high-level network features, in order to classify data as normal or anomalous. The MODWT was used to extract the approximations of two input signal categories at different levels of decomposition, and are used as processing elements for the multi resolution DCA. The model was evaluated using the NSL-KDD, UNSW-NB15, CIC-IDS2017 and CSE-CIC-IDS2018 datasets, containing contemporary network traffic and attacks. The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively. Comparisons with the DCA and state-of-the-art approaches for network anomaly detection are presented. The proposed approach was able to surpass state-of-the-art approaches with UNSW-NB15 and CSECIC-IDS2018 datasets, whereas the results obtained with the NSL-KDD and CIC-IDS2017 datasets are competitive with machine learning approaches.
@article{
title = {Multiresolution dendritic cell algorithm for network anomaly detection},
type = {article},
year = {2021},
pages = {1-32},
volume = {7},
websites = {https://peerj.com/articles/cs-749},
month = {10},
day = {19},
id = {c919fe71-9cc4-3e0d-8ece-f2354e03d126},
created = {2022-08-29T17:42:18.077Z},
file_attached = {true},
profile_id = {940dd160-7d67-3a5f-b9f8-935da0571367},
group_id = {92fccab2-8d44-33bc-b301-7b94bb18523c},
last_modified = {2022-08-29T17:43:49.435Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
private_publication = {false},
abstract = {Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, as information systems provide essential services for enterprises and individuals. The consequences of these attacks could be the access, disclosure, or modification of information, as well as denial of computer services and resources. Intrusion Detection Systems (IDS) are developed as solutions to detect anomalous behavior, such as denial of service, and backdoors. The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution Analysis (MRA) Maximal Overlap Discrete Wavelet Transform (MODWT), as well as the segmented deterministic DCA approach (S-dDCA). The proposed approach is a binary classifier that aims to analyze a time-frequency representation of time-series data obtained from high-level network features, in order to classify data as normal or anomalous. The MODWT was used to extract the approximations of two input signal categories at different levels of decomposition, and are used as processing elements for the multi resolution DCA. The model was evaluated using the NSL-KDD, UNSW-NB15, CIC-IDS2017 and CSE-CIC-IDS2018 datasets, containing contemporary network traffic and attacks. The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively. Comparisons with the DCA and state-of-the-art approaches for network anomaly detection are presented. The proposed approach was able to surpass state-of-the-art approaches with UNSW-NB15 and CSECIC-IDS2018 datasets, whereas the results obtained with the NSL-KDD and CIC-IDS2017 datasets are competitive with machine learning approaches.},
bibtype = {article},
author = {Limon-Cantu, David and Alarcon-Aquino, Vicente},
doi = {10.7717/peerj-cs.749},
journal = {PeerJ Computer Science},
number = {e749}
}
Downloads: 4
{"_id":"scW5D2Pe5LJ5j7xYR","bibbaseid":"limoncantu-alarconaquino-multiresolutiondendriticcellalgorithmfornetworkanomalydetection-2021","author_short":["Limon-Cantu, D.","Alarcon-Aquino, V."],"bibdata":{"title":"Multiresolution dendritic cell algorithm for network anomaly detection","type":"article","year":"2021","pages":"1-32","volume":"7","websites":"https://peerj.com/articles/cs-749","month":"10","day":"19","id":"c919fe71-9cc4-3e0d-8ece-f2354e03d126","created":"2022-08-29T17:42:18.077Z","file_attached":"true","profile_id":"940dd160-7d67-3a5f-b9f8-935da0571367","group_id":"92fccab2-8d44-33bc-b301-7b94bb18523c","last_modified":"2022-08-29T17:43:49.435Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"private_publication":false,"abstract":"Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, as information systems provide essential services for enterprises and individuals. The consequences of these attacks could be the access, disclosure, or modification of information, as well as denial of computer services and resources. Intrusion Detection Systems (IDS) are developed as solutions to detect anomalous behavior, such as denial of service, and backdoors. The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution Analysis (MRA) Maximal Overlap Discrete Wavelet Transform (MODWT), as well as the segmented deterministic DCA approach (S-dDCA). The proposed approach is a binary classifier that aims to analyze a time-frequency representation of time-series data obtained from high-level network features, in order to classify data as normal or anomalous. The MODWT was used to extract the approximations of two input signal categories at different levels of decomposition, and are used as processing elements for the multi resolution DCA. The model was evaluated using the NSL-KDD, UNSW-NB15, CIC-IDS2017 and CSE-CIC-IDS2018 datasets, containing contemporary network traffic and attacks. The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively. Comparisons with the DCA and state-of-the-art approaches for network anomaly detection are presented. The proposed approach was able to surpass state-of-the-art approaches with UNSW-NB15 and CSECIC-IDS2018 datasets, whereas the results obtained with the NSL-KDD and CIC-IDS2017 datasets are competitive with machine learning approaches.","bibtype":"article","author":"Limon-Cantu, David and Alarcon-Aquino, Vicente","doi":"10.7717/peerj-cs.749","journal":"PeerJ Computer Science","number":"e749","bibtex":"@article{\n title = {Multiresolution dendritic cell algorithm for network anomaly detection},\n type = {article},\n year = {2021},\n pages = {1-32},\n volume = {7},\n websites = {https://peerj.com/articles/cs-749},\n month = {10},\n day = {19},\n id = {c919fe71-9cc4-3e0d-8ece-f2354e03d126},\n created = {2022-08-29T17:42:18.077Z},\n file_attached = {true},\n profile_id = {940dd160-7d67-3a5f-b9f8-935da0571367},\n group_id = {92fccab2-8d44-33bc-b301-7b94bb18523c},\n last_modified = {2022-08-29T17:43:49.435Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, as information systems provide essential services for enterprises and individuals. The consequences of these attacks could be the access, disclosure, or modification of information, as well as denial of computer services and resources. Intrusion Detection Systems (IDS) are developed as solutions to detect anomalous behavior, such as denial of service, and backdoors. The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution Analysis (MRA) Maximal Overlap Discrete Wavelet Transform (MODWT), as well as the segmented deterministic DCA approach (S-dDCA). The proposed approach is a binary classifier that aims to analyze a time-frequency representation of time-series data obtained from high-level network features, in order to classify data as normal or anomalous. The MODWT was used to extract the approximations of two input signal categories at different levels of decomposition, and are used as processing elements for the multi resolution DCA. The model was evaluated using the NSL-KDD, UNSW-NB15, CIC-IDS2017 and CSE-CIC-IDS2018 datasets, containing contemporary network traffic and attacks. The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively. Comparisons with the DCA and state-of-the-art approaches for network anomaly detection are presented. The proposed approach was able to surpass state-of-the-art approaches with UNSW-NB15 and CSECIC-IDS2018 datasets, whereas the results obtained with the NSL-KDD and CIC-IDS2017 datasets are competitive with machine learning approaches.},\n bibtype = {article},\n author = {Limon-Cantu, David and Alarcon-Aquino, Vicente},\n doi = {10.7717/peerj-cs.749},\n journal = {PeerJ Computer Science},\n number = {e749}\n}","author_short":["Limon-Cantu, D.","Alarcon-Aquino, V."],"urls":{"Paper":"https://bibbase.org/service/mendeley/940dd160-7d67-3a5f-b9f8-935da0571367/file/403d16fe-3a1b-0965-3f09-8e3a47a103f6/peerj_cs_749.pdf.pdf","Website":"https://peerj.com/articles/cs-749"},"biburl":"https://bibbase.org/service/mendeley/940dd160-7d67-3a5f-b9f8-935da0571367","bibbaseid":"limoncantu-alarconaquino-multiresolutiondendriticcellalgorithmfornetworkanomalydetection-2021","role":"author","metadata":{"authorlinks":{}},"downloads":4},"bibtype":"article","biburl":"https://bibbase.org/service/mendeley/940dd160-7d67-3a5f-b9f8-935da0571367","dataSources":["ya2CyA73rpZseyrZ8","uTykyhFv6T7J2dX6z","2252seNhipfTmjEBQ"],"keywords":[],"search_terms":["multiresolution","dendritic","cell","algorithm","network","anomaly","detection","limon-cantu","alarcon-aquino"],"title":"Multiresolution dendritic cell algorithm for network anomaly detection","year":2021,"downloads":4}