{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:17:24Z","timestamp":1766067444919,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>The autonomous and adaptable identification of anomalies in industrial contexts, particularly in the physical processes of Cyber-Physical Production Systems (CPPS), requires using critical technologies to identify failures correctly. Most of the existing solutions in the anomaly detection research area do not consider such systems\u2019 dynamics. Due to the complexity and multidimensionality of CPPS, a scalable, adaptable, and rapid anomaly detection system is needed, considering the new design specifications of Industry 4.0 solutions. Immune-based models, such as the Dendritic Cell Algorithm (DCA), may provide a rich source of inspiration for detecting anomalies, since the anomaly detection problem in CPPS greatly resembles the functionality of the biological dendritic cells in defending the human body from hazardous pathogens. This paper tackles DCA limitations that may compromise its usage in anomaly detection applications, such as the manual characterization of safe and danger signals, data analysis not suitable for online classification, and the lack of an object-oriented implementation of the algorithm. The proposed approach, the Cursory Dendritic Cell Algorithm (CDCA), is a novel variation of the DCA, developed to be flexible and monitor physical industrial processes continually while detecting anomalies in an online fashion. This work\u2019s contribution is threefold. First, it provides a comprehensive review of Artificial Immune Systems (AIS), focusing on AIS applied to the anomaly detection problem. Then, a new object-oriented architecture for the DCA implementation is described, enabling the modularity and abstraction of the algorithm stages into different classes (modules). Finally, the CDCA for the anomaly detection problem is proposed. The CDCA was successfully validated in two industrial-oriented dataset benchmarks for physical anomaly and network intrusion detection, the Skoltech Anomaly Benchmark (SKAB) and M2M using OPC UA. When compared to other algorithms, the proposed approach exhibits promising classification results. It was placed fourth on the SKAB scoreboard and presented a competitive performance with the incremental Dendritic Cell Algorithm (iDCA).<\/jats:p>","DOI":"10.3390\/a15010001","type":"journal-article","created":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T01:08:09Z","timestamp":1640135289000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Towards Bio-Inspired Anomaly Detection Using the Cursory Dendritic Cell Algorithm"],"prefix":"10.3390","volume":"15","author":[{"given":"Carlos","family":"Pinto","sequence":"first","affiliation":[{"name":"Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias, s\/n, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0345-1208","authenticated-orcid":false,"given":"Rui","family":"Pinto","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias, s\/n, 4200-465 Porto, Portugal"},{"name":"SYSTEC\u2014Research Center for Systems and Technologies, Rua Dr. Roberto Frias, s\/n, office i219, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7757-7308","authenticated-orcid":false,"given":"Gil","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias, s\/n, 4200-465 Porto, Portugal"},{"name":"SYSTEC\u2014Research Center for Systems and Technologies, Rua Dr. Roberto Frias, s\/n, office i219, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s12599-014-0334-4","article-title":"Industry 4.0","volume":"6","author":"Lasi","year":"2014","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"78238","DOI":"10.1109\/ACCESS.2018.2884906","article-title":"A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective","volume":"6","author":"Xu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Jazdi, N. (2014, January 22\u201324). Cyber physical systems in the context of Industry 4.0. Proceedings of the 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania.","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sharma, M., Elmiligi, H., and Gebali, F. (2020). Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS). Handbook of Big Data Privacy, Springer International Publishing.","DOI":"10.1007\/978-3-030-38557-6_9"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a Cyberwarfare Weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Sinanovi\u0107, H., and Mrdovic, S. (2017, January 21\u201323). Analysis of Mirai malicious software. Proceedings of the 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia.","DOI":"10.23919\/SOFTCOM.2017.8115504"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Oueslati, N.E., Mrabet, H., Jemai, A., and Alhomoud, A. (2019, January 20\u201322). Comparative Study of the Common Cyber-physical Attacks in Industry 4.0. Proceedings of the 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Tunis, Tunisia.","DOI":"10.1109\/IINTEC48298.2019.9112097"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"55:1","DOI":"10.1145\/2542049","article-title":"A Survey of Intrusion Detection Techniques for Cyber-Physical Systems","volume":"46","author":"Mitchell","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yasaei, R., Hernandez, F., and Al Faruque, M.A. (2020, January 2\u20135). IoT-CAD: Context-Aware Adaptive Anomaly Detection in IoT Systems Through Sensor Association. Proceedings of the 2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD), San Diego, CA, USA.","DOI":"10.1145\/3400302.3415672"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.engappai.2015.08.006","article-title":"Fault detection, diagnosis and recovery using Artificial Immune Systems: A review","volume":"46","author":"Bayar","year":"2015","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.1016\/j.asoc.2010.08.024","article-title":"Recent Advances in Artificial Immune Systems: Models and Applications","volume":"11","author":"Dasgupta","year":"2011","journal-title":"Appl. Soft Comput."},{"key":"ref_12","unstructured":"Forrest, S., Perelson, A., Allen, L., and Cherukuri, R. (1994, January 16\u201318). Self-nonself discrimination in a computer. Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1126\/science.1071059","article-title":"The Danger Model: A Renewed Sense of Self","volume":"296","author":"Matzinger","year":"2002","journal-title":"Science"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"119","DOI":"10.3322\/canjclin.26.2.119","article-title":"A modification of jerne\u2019s theory of antibody production using the concept of clonal selection","volume":"26","author":"Burnet","year":"1976","journal-title":"CA A Cancer J. Clin."},{"key":"ref_15","unstructured":"De Castro, L.N., and Von Zuben, F.J. (1999). Artificial Immune Systems: Part I\u2013Basic Theory and Applications, Universidade Estadual de Campinas. Dezembro de, Tech. Report."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10462-011-9206-1","article-title":"A review of clonal selection algorithm and its applications","volume":"36","year":"2011","journal-title":"Artif. Intell. Rev."},{"key":"ref_17","unstructured":"Brownlee, J. (2007). Clonal Selection Algorithms, Complex Intelligent Systems Laboratory, Swinburne University of Technology. Technical Report 070209A."},{"key":"ref_18","unstructured":"Nunes de Casto, L., and Von Zuben, F. (2000, January 25). An evolutionary immune network for data clustering. Proceedings of the Vol.1. Sixth Brazilian Symposium on Neural Networks, Rio de Janeiro, Brazil."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0303-2647(99)00092-1","article-title":"An artificial immune system for data analysis","volume":"55","author":"Timmis","year":"2000","journal-title":"Biosystems"},{"key":"ref_20","first-page":"373","article-title":"Towards a network theory of the immune system","volume":"125C","author":"Jerne","year":"1974","journal-title":"Ann. Immunol."},{"key":"ref_21","unstructured":"Hoffmann, G.W. (2021, November 21). Immune Network Theory. Monograph. Available online: https:\/\/phas.ubc.ca\/~hoffmann\/book\/Immune%20Network%20Theory.pdf."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1002\/eji.1830050511","article-title":"A network theory of the immune system","volume":"5","author":"Richter","year":"1975","journal-title":"Eur. J. Immunol."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Knight, T., and Timmis, J. (December, January 29). AINE: An immunological approach to data mining. Proceedings of the 2001 IEEE International Conference on Data Mining, San Jose, CA, USA.","DOI":"10.1109\/ICDM.2001.989532"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bersini, H., and Carneiro, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. Artificial Immune Systems, Springer.","DOI":"10.1007\/11823940"},{"key":"ref_25","unstructured":"Twycross, J.P. (2007). Integrated Innate and Adaptive Artificial Immune Systems Applied to Process Anomaly Detection. [Ph.D. Thesis, University of Nottingham]."},{"key":"ref_26","unstructured":"Greensmith, J. (2007). The Dendritic Cell Algorithm. [Ph.D. Thesis, University of Nottingham]."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Al-Dabagh, N.B.I., and Ali, I.A. (2011, January 4\u20138). Design and implementation of artificial immune system for detecting flooding attacks. Proceedings of the 2011 International Conference on High Performance Computing Simulation, Istanbul, Turkey.","DOI":"10.1109\/HPCSim.2011.5999850"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Pinto, R., Gon\u00e7alves, G., Tovar, E., and Delsing, J. (2020, January 8\u201311). Attack Detection in Cyber-Physical Production Systems using the Deterministic Dendritic Cell Algorithm. Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria.","DOI":"10.1109\/ETFA46521.2020.9212021"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ulsoy, A.G. (2006). Monitoring and Control of Machining. Condition Monitoring and Control for Intelligent Manufacturing, Springer.","DOI":"10.1007\/1-84628-269-1_1"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly Detection: A Survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"ref_31","unstructured":"Bhattacharyya, D.K., and Kalita, J.K. (2019). Network Anomaly Detection: A Machine Learning Perspective, Chapman and Hall\/CRC."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Tokarev, V., Sychugov, A., and Anchishkin, A. (2019, January 8\u201314). Detection of Anomalies in the Information Networks of Industrial Automation Systems Based on Artificial Immune Detectors. Proceedings of the 2019 International Russian Automation Conference (RusAutoCon), Sochi, Russia.","DOI":"10.1109\/RUSAUTOCON.2019.8867593"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Yin, H., Costa, J.A.F., and Barreto, G. (2012). A Transitional View of Immune Inspired Techniques for Anomaly Detection. Intelligent Data Engineering and Automated Learning\u2014IDEAL 2012, Springer.","DOI":"10.1007\/978-3-642-32639-4"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Coello Coello, C.A., Greensmith, J., Krasnogor, N., Li\u00f2, P., Nicosia, G., and Pavone, M. (2012). A Comparative Study of Negative Selection Based Anomaly Detection in Sequence Data. Artificial Immune Systems, Springer.","DOI":"10.1007\/978-3-642-33757-4"},{"key":"ref_35","unstructured":"Greensmith, J., Twycross, J., and Aickelin, U. (2006, January 16\u201321). Dendritic Cells for Anomaly Detection. Proceedings of the 2006 IEEE International Conference on Evolutionary Computation, Vancouver, BC, Canada."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","article-title":"Information fusion for anomaly detection with the dendritic cell algorithm","volume":"11","author":"Greensmith","year":"2010","journal-title":"Inf. Fusion"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.biosystems.2013.01.001","article-title":"Theoretical formulation and analysis of the deterministic dendritic cell algorithm","volume":"111","author":"Gu","year":"2013","journal-title":"Biosystems"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Greensmith, J., and Gale, M.B. (2017, January 5\u20138). The Functional Dendritic Cell Algorithm: A formal specification with Haskell. Proceedings of the 2017 IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain.","DOI":"10.1109\/CEC.2017.7969518"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Gu, F., Greensmith, J., and Aickelin, U. (2009, January 8\u201312). Integrating Real-Time Analysis with the Dendritic Cell Algorithm through Segmentation. Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, Montreal, QC, Canada.","DOI":"10.1145\/1569901.1570063"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Yuan, S., and Chen, Q.j. (2012, January 25\u201327). A Dendritic Cell Algorithm for real-time anomaly detection. Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China.","DOI":"10.1109\/CSAE.2012.6272635"},{"key":"ref_41","unstructured":"Arai, K. (2021). Incremental Dendritic Cell Algorithm for Intrusion Detection in Cyber-Physical Production Systems. Intelligent Computing, Springer International Publishing."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Gu, F., Greensmith, J., Oates, R., and Aickelin, U. (2009). Pca 4 dca: The application of principal component analysis to the dendritic cell algorithm. SSRN Electron. J.","DOI":"10.2139\/ssrn.2830357"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Chelly, Z., and Elouedi, Z. (2014, January 3\u20135). A study of the data pre-processing module of the dendritic cell evolutionary algorithm. Proceedings of the 2014 International Conference on Control, Decision and Information Technologies (CoDIT), Metz, France.","DOI":"10.1109\/CoDIT.2014.6996970"},{"key":"ref_44","unstructured":"Katser, I.D., and Kozitsin, V.O. (2021, November 21). Skoltech Anomaly Benchmark (SKAB). Available online: https:\/\/www.kaggle.com\/dsv\/1693952."},{"key":"ref_45","unstructured":"Pinto, R. (2021, November 21). M2M Using OPC UA; IEEE Dataport. Available online: https:\/\/ieee-dataport.org\/open-access\/m2m-using-opc-ua."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:50:46Z","timestamp":1760169046000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["a15010001"],"URL":"https:\/\/doi.org\/10.3390\/a15010001","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2021,12,21]]}}}