Skip to main content

Unsupervised Anomaly Detection Based n an Evolutionary Artificial Immune Network

  • Conference paper
Applications of Evolutionary Computing (EvoWorkshops 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3449))

Included in the following conference series:

Abstract

To solve the problem of unsupervised anomaly detection, an unsupervised anomaly-detecting algorithm based on an evolutionary artificial immune network is proposed in this paper. An evolutionary artificial immune network is “evolved” by using unlabeled training sample data to represent the distribution of the original input data set. Then a traditional hierarchical agglomerative clustering method is employed to perform clustering analysis within the algorithm. It is shown that the algorithm is feasible and effective with simulations over the 1999 KDD CUP dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Denning, D.E.: An intrusion detection model. IEEE Transactions on Software Engineering SE-13, 222–232 (1987)

    Article  Google Scholar 

  2. Eskin, E.: Anomaly detection over noisy data using learned probability distribution. In: Proceedings of the International Conference on Machine Learning (2000)

    Google Scholar 

  3. Eskin, E., Stolfo, S., et al.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. Data Mining for Security Applications. Kluwer, Dordrecht (2002)

    Google Scholar 

  4. Portnoy, L.: Intrusion Detection with Unlabeled Data using Clustering. Undergraduate Thesis, Columbia University (December 2000)

    Google Scholar 

  5. Luo, M., Wang, L.-n., Zhang, H.-g.: An Unsupervised Clustering-Based Intrusion Detection Method. Acta Electronica Sinica 30(11), 1713–1716 (2003)

    Google Scholar 

  6. Prerau, M.J., Eskin, E.: Unsupervised Anomaly Detection Using an Optimized K-Nearest Neighbors Algorithm. Undergraduate Thesis, Columbia University (December 2000)

    Google Scholar 

  7. de Castro, L.N., Von Zuben, F.J.: An Evolutionary Immune Network for Data Clustering. In: Proc. of the IEEE SBRN, pp. 84–89 (November 2000)

    Google Scholar 

  8. de Castro, L.N., Timmis, J.: Hierarchy and Convergence of Immune Networks: Basic Ideas and Preliminary Results. In: 1st ICARIS (2002)

    Google Scholar 

  9. KDD99. KDD99 cup dataset (1999), http://kdd.ics.uci.edu/databases/kddcup99/kddcup.html

  10. Licheng, J., Haifeng, D.: An Artificial Immune System: Progress and Prospect. Acta Electronica Sinica 31(10), 1540–1549 (2003)

    Google Scholar 

  11. Burnett, F.M.: The Clonal Selection Theory of Immunity. Vanderbilt University Press, Nashville (1959)

    Google Scholar 

  12. Jerne, N.K.: Towards a Network Theory of the Immune System. Ann. Immunol (Inst. Pasteur) 125C, 373–389 (1974)

    Google Scholar 

  13. Results of the KDD 1999 Classifier Learning Contest, http://wwwcse.ucsd.edu/users/elkan/clresults.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fang, L., Le-Ping, L. (2005). Unsupervised Anomaly Detection Based n an Evolutionary Artificial Immune Network. In: Rothlauf, F., et al. Applications of Evolutionary Computing. EvoWorkshops 2005. Lecture Notes in Computer Science, vol 3449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32003-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32003-6_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25396-9

  • Online ISBN: 978-3-540-32003-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics