Artificial Dendritic Cells Algorithm for Online Break-In Fraud Detection

An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main goal of this paper is to apply Dendritic Cells Algorithm to detect the online break-in fraud for an Online Video on Demand System. Sensitivity...

Full description

Saved in:
Bibliographic Details
Published in2009 Second International Conference on Developments in eSystems Engineering pp. 181 - 189
Main Authors Huang, R., Tawfik, H., Nagar, A.K.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2009
Subjects
Online AccessGet full text
ISBN1424454018
9781424454013
DOI10.1109/DeSE.2009.59

Cover

Abstract An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main goal of this paper is to apply Dendritic Cells Algorithm to detect the online break-in fraud for an Online Video on Demand System. Sensitivity analysis for parameters gave different versions of DCA, including different DCs, antigen multiplier, antigen receptors, and migration threshold are presented in the paper. The results not only suggest the DCA is applicable to fraud detection, but also when compared with NSA, DCA shown compromising accuracy with high detection rate, low false alarm and handle high dimensional data set better.
AbstractList An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main goal of this paper is to apply Dendritic Cells Algorithm to detect the online break-in fraud for an Online Video on Demand System. Sensitivity analysis for parameters gave different versions of DCA, including different DCs, antigen multiplier, antigen receptors, and migration threshold are presented in the paper. The results not only suggest the DCA is applicable to fraud detection, but also when compared with NSA, DCA shown compromising accuracy with high detection rate, low false alarm and handle high dimensional data set better.
Author Nagar, A.K.
Huang, R.
Tawfik, H.
Author_xml – sequence: 1
  givenname: R.
  surname: Huang
  fullname: Huang, R.
  organization: Deanery of Bus. & Comput. Sci., Liverpool Hope Univ., Liverpool, UK
– sequence: 2
  givenname: H.
  surname: Tawfik
  fullname: Tawfik, H.
  organization: Deanery of Bus. & Comput. Sci., Liverpool Hope Univ., Liverpool, UK
– sequence: 3
  givenname: A.K.
  surname: Nagar
  fullname: Nagar, A.K.
  organization: Deanery of Bus. & Comput. Sci., Liverpool Hope Univ., Liverpool, UK
BookMark eNpFjj1PwzAYhI2gErR0Y2PxH0jw66_EY0hbWqlSB2Cu7OQ1GFIHOWHg3xMEErecHunudHNyEfuIhNwAywGYuVvh4zrnjJlcmTMyB8mlVJJxff4PUM7I_CdjhCo1vyTLYXhjk6TiQsIV2VZpDD40wXZ0hbFNYQwNrbHrBlp1L_3Eryfq-0QPsQsR6X1C-57tIt0k-9lOnRGbMfTxmsy87QZc_vmCPG_WT_U22x8ednW1zwIUasywMUa3TiAHsNqW1jookKPzBTCmmecCvDPTc89Kg965whpdWKaF4l42YkFuf3cDIh4_UjjZ9HVUwihgpfgGq7dO_A
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DeSE.2009.59
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424454026
9781424454020
EndPage 189
ExternalDocumentID 5395108
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IK
6IL
6IM
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i175t-ec996db3e211a6a8aab17e2ebf710060f231fb9401f089efbb7a967a06352f4c3
IEDL.DBID RIE
ISBN 1424454018
9781424454013
IngestDate Wed Aug 27 03:00:33 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009935862
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-ec996db3e211a6a8aab17e2ebf710060f231fb9401f089efbb7a967a06352f4c3
PageCount 9
ParticipantIDs ieee_primary_5395108
PublicationCentury 2000
PublicationDate 2009-Dec.
PublicationDateYYYYMMDD 2009-12-01
PublicationDate_xml – month: 12
  year: 2009
  text: 2009-Dec.
PublicationDecade 2000
PublicationTitle 2009 Second International Conference on Developments in eSystems Engineering
PublicationTitleAbbrev DESE
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452341
Score 1.4614565
Snippet An Artificial Immune System based on Dendritic Cells is recently established and has been applied in a number of applications in computer security. The main...
SourceID ieee
SourceType Publisher
StartPage 181
SubjectTerms Application software
Artificial Dendritic Cells Algorithm
Artificial immune systems
Break-in
Computer security
Danger Theory
Distributed control
Fraud Detection
Sensitivity analysis
Video on demand
Title Artificial Dendritic Cells Algorithm for Online Break-In Fraud Detection
URI https://ieeexplore.ieee.org/document/5395108
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF3anjyptOI3e_Dotsnm-1j7QRUqghZ6KzubWZXWVGp68dc7m6RRxIOQQzYksEyWzJvNe28YuwJQSqIJhB-gI_zQBZGA1iJR2qfDccBYNfL0PpzM_Lt5MG-w61oLg4gF-Qy79rT4l5-u9dZulfUCz-KBuMmatMxKrVa9n2KtwemLvNNuERBx452lUzX2auJ70hvi46h0q7QupT8aqxR5ZbzPprsZlXSSZXebQ1d__jJr_O-UD1jnW8HHH-rcdMgamLXZpL8pmEG05PgQs7TocsAHuFp98P7qeU3jlzdOKJaXBqT8hhDlUtxmnODtNqVn8oK4lXXYbDx6GkxE1UlBvBI8yAVqKmtS8JDKPRWqWClwI5QIxpr7hI4hlGcgoRgZJ07QAEQqCSNF-CWQxtfeEWtl6wyPGZcpYCQ11eAgfQ8CiOnuUCrtGEQTeiesbaOweC_NMhZVAE7_vnzG9mTVkMFxz1kr32zxgrJ8DpfF6_0CvoOlXA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qPehJpRXf7sGjafN-HGsfpNoWwRZ6KzubWZXWVGpy8dc7eTSKeBByyIYElknIfLP7fd8wdgMghInK0WwHdc12DdACkFILhLTp0HVQmRp5PHHDmX0_d-Y1dltpYRAxJ59hKzvN9_KjtUyzpbK2Y2V4wN9hu5T3badQa1UrKpk5OP2Tt-otgiKGvzV1KsdWRX0P2j186hd-lZlP6Y_WKnlmGRyw8XZOBaFk2UoTaMnPX3aN_530IWt-a_j4Y5WdjlgN4wYLO5ucG0QfHe9hHOV9DngXV6sP3lk9r2n88sYJx_LCgpTfEaZcasOYE8BNI3omyalbcZPNBv1pN9TKXgraKwGERENJhU0EFlLBJ1zhCwGGhyaCyux9XF0RzlMQUIyU7geoADwRuJ4gBOOYypbWMavH6xhPGDcjQM-UVIWDaVvggE93u6aQukJUrnXKGlkUFu-FXcaiDMDZ35ev2V44HY8Wo-Hk4Zztm2V7Bt24YPVkk-Il5fwErvJX_QWcOqip
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+Second+International+Conference+on+Developments+in+eSystems+Engineering&rft.atitle=Artificial+Dendritic+Cells+Algorithm+for+Online+Break-In+Fraud+Detection&rft.au=Huang%2C+R.&rft.au=Tawfik%2C+H.&rft.au=Nagar%2C+A.K.&rft.date=2009-12-01&rft.pub=IEEE&rft.isbn=9781424454013&rft.spage=181&rft.epage=189&rft_id=info:doi/10.1109%2FDeSE.2009.59&rft.externalDocID=5395108
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/sc.gif&client=summon&freeimage=true