Artificial Dendritic Cells Algorithm for Online Break-In Fraud Detection
An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main goal of this paper is to apply Dendritic Cells Algorithm to detect the online break-in fraud for an Online Video on Demand System. Sensitivity...
Saved in:
Published in | 2009 Second International Conference on Developments in eSystems Engineering pp. 181 - 189 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2009
|
Subjects | |
Online Access | Get full text |
ISBN | 1424454018 9781424454013 |
DOI | 10.1109/DeSE.2009.59 |
Cover
Abstract | An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main goal of this paper is to apply Dendritic Cells Algorithm to detect the online break-in fraud for an Online Video on Demand System. Sensitivity analysis for parameters gave different versions of DCA, including different DCs, antigen multiplier, antigen receptors, and migration threshold are presented in the paper. The results not only suggest the DCA is applicable to fraud detection, but also when compared with NSA, DCA shown compromising accuracy with high detection rate, low false alarm and handle high dimensional data set better. |
---|---|
AbstractList | An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main goal of this paper is to apply Dendritic Cells Algorithm to detect the online break-in fraud for an Online Video on Demand System. Sensitivity analysis for parameters gave different versions of DCA, including different DCs, antigen multiplier, antigen receptors, and migration threshold are presented in the paper. The results not only suggest the DCA is applicable to fraud detection, but also when compared with NSA, DCA shown compromising accuracy with high detection rate, low false alarm and handle high dimensional data set better. |
Author | Nagar, A.K. Huang, R. Tawfik, H. |
Author_xml | – sequence: 1 givenname: R. surname: Huang fullname: Huang, R. organization: Deanery of Bus. & Comput. Sci., Liverpool Hope Univ., Liverpool, UK – sequence: 2 givenname: H. surname: Tawfik fullname: Tawfik, H. organization: Deanery of Bus. & Comput. Sci., Liverpool Hope Univ., Liverpool, UK – sequence: 3 givenname: A.K. surname: Nagar fullname: Nagar, A.K. organization: Deanery of Bus. & Comput. Sci., Liverpool Hope Univ., Liverpool, UK |
BookMark | eNpFjj1PwzAYhI2gErR0Y2PxH0jw66_EY0hbWqlSB2Cu7OQ1GFIHOWHg3xMEErecHunudHNyEfuIhNwAywGYuVvh4zrnjJlcmTMyB8mlVJJxff4PUM7I_CdjhCo1vyTLYXhjk6TiQsIV2VZpDD40wXZ0hbFNYQwNrbHrBlp1L_3Eryfq-0QPsQsR6X1C-57tIt0k-9lOnRGbMfTxmsy87QZc_vmCPG_WT_U22x8ednW1zwIUasywMUa3TiAHsNqW1jookKPzBTCmmecCvDPTc89Kg965whpdWKaF4l42YkFuf3cDIh4_UjjZ9HVUwihgpfgGq7dO_A |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/DeSE.2009.59 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1424454026 9781424454020 |
EndPage | 189 |
ExternalDocumentID | 5395108 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IG 6IK 6IL 6IM 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i175t-ec996db3e211a6a8aab17e2ebf710060f231fb9401f089efbb7a967a06352f4c3 |
IEDL.DBID | RIE |
ISBN | 1424454018 9781424454013 |
IngestDate | Wed Aug 27 03:00:33 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2009935862 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-ec996db3e211a6a8aab17e2ebf710060f231fb9401f089efbb7a967a06352f4c3 |
PageCount | 9 |
ParticipantIDs | ieee_primary_5395108 |
PublicationCentury | 2000 |
PublicationDate | 2009-Dec. |
PublicationDateYYYYMMDD | 2009-12-01 |
PublicationDate_xml | – month: 12 year: 2009 text: 2009-Dec. |
PublicationDecade | 2000 |
PublicationTitle | 2009 Second International Conference on Developments in eSystems Engineering |
PublicationTitleAbbrev | DESE |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000452341 |
Score | 1.4614565 |
Snippet | An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 181 |
SubjectTerms | Application software Artificial Dendritic Cells Algorithm Artificial immune systems Break-in Computer security Danger Theory Distributed control Fraud Detection Sensitivity analysis Video on demand |
Title | Artificial Dendritic Cells Algorithm for Online Break-In Fraud Detection |
URI | https://ieeexplore.ieee.org/document/5395108 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF3anjyptOI3e_Dotsnm-1j7QRUqghZ6KzubWZXWVGp68dc7m6RRxIOQQzYksEyWzJvNe28YuwJQSqIJhB-gI_zQBZGA1iJR2qfDccBYNfL0PpzM_Lt5MG-w61oLg4gF-Qy79rT4l5-u9dZulfUCz-KBuMmatMxKrVa9n2KtwemLvNNuERBx452lUzX2auJ70hvi46h0q7QupT8aqxR5ZbzPprsZlXSSZXebQ1d__jJr_O-UD1jnW8HHH-rcdMgamLXZpL8pmEG05PgQs7TocsAHuFp98P7qeU3jlzdOKJaXBqT8hhDlUtxmnODtNqVn8oK4lXXYbDx6GkxE1UlBvBI8yAVqKmtS8JDKPRWqWClwI5QIxpr7hI4hlGcgoRgZJ07QAEQqCSNF-CWQxtfeEWtl6wyPGZcpYCQ11eAgfQ8CiOnuUCrtGEQTeiesbaOweC_NMhZVAE7_vnzG9mTVkMFxz1kr32zxgrJ8DpfF6_0CvoOlXA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qPehJpRXf7sGjafN-HGsfpNoWwRZ6KzubWZXWVGpy8dc7eTSKeBByyIYElknIfLP7fd8wdgMghInK0WwHdc12DdACkFILhLTp0HVQmRp5PHHDmX0_d-Y1dltpYRAxJ59hKzvN9_KjtUyzpbK2Y2V4wN9hu5T3badQa1UrKpk5OP2Tt-otgiKGvzV1KsdWRX0P2j186hd-lZlP6Y_WKnlmGRyw8XZOBaFk2UoTaMnPX3aN_530IWt-a_j4Y5WdjlgN4wYLO5ucG0QfHe9hHOV9DngXV6sP3lk9r2n88sYJx_LCgpTfEaZcasOYE8BNI3omyalbcZPNBv1pN9TKXgraKwGERENJhU0EFlLBJ1zhCwGGhyaCyux9XF0RzlMQUIyU7geoADwRuJ4gBOOYypbWMavH6xhPGDcjQM-UVIWDaVvggE93u6aQukJUrnXKGlkUFu-FXcaiDMDZ35ev2V44HY8Wo-Hk4Zztm2V7Bt24YPVkk-Il5fwErvJX_QWcOqip |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+Second+International+Conference+on+Developments+in+eSystems+Engineering&rft.atitle=Artificial+Dendritic+Cells+Algorithm+for+Online+Break-In+Fraud+Detection&rft.au=Huang%2C+R.&rft.au=Tawfik%2C+H.&rft.au=Nagar%2C+A.K.&rft.date=2009-12-01&rft.pub=IEEE&rft.isbn=9781424454013&rft.spage=181&rft.epage=189&rft_id=info:doi/10.1109%2FDeSE.2009.59&rft.externalDocID=5395108 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/sc.gif&client=summon&freeimage=true |