Abstract
This paper describes a b-v model which is enhanced version of the negative selection algorithm (NSA). In contrast to formerly developed approaches, binary and real-valued detectors are simultaneously used. The reason behind developing this hybrid is our willingness to overcome the scalability problems occuring when only one type of detectors is used. High-dimensional datasets are a great challenge for NSA. But the quality of generated detectors, duration of learning stage as well as duration of classification stage need a careful treatment also. Thus, we discuss various versions of the b-v model developed to increase its efficiency. Versatility of proposed approach was intensively tested by using popular testbeds concerning domains like computer’s security (intruders and spam detection) and recognition of handwritten words.
Chapter PDF
References
Aggarwal, C.C., Hinneburg, A., Keim, D.A.: On the Surprising Behavior of Distance Metrics in High Dimensional Space. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 420–434. Springer, Heidelberg (2001)
Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, July 9-13, pp. 3–10 (2002)
de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer (2002)
Chmielewski, A., Wierzchoń, S.T.: On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Białostockiej (2), 39–50 (2007)
Dasgupta, D., Forrest, S.: Novelty detection in time series data using ideas from immunology. In: Fifth International Conf. on Intelligent Systems, Reno, Nevada, June 19-21 (1996)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of Self for Unix Processes. In: Proc. of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120–128. IEEE Computer Society Press (1996)
Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202–212 (1994)
Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. on Evolutionary Computation 6, 252–280 (2002)
Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation J. 8(4), 443–473 (2000)
Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004, Part I. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004)
Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evolutionary Computation 15(2), 223–251 (2007)
Sayood, K.: Introduction to Data Compression. Elsevier (2005)
Stepaniuk, J.: Rough Set Data Mining of Diabetes Data. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1999. LNCS, vol. 1609, pp. 457–465. Springer, Heidelberg (1999)
Stibor, T.: Phase Transition and the Computational Complexity of Generating r-Contiguous Detectors. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol. 4628, pp. 142–155. Springer, Heidelberg (2007)
Tabedzki, M., Rybnik, M., Saaeed, K.: Method for handwritten word recognition without segmentation. Polish J. of Environmental Studies 17, 47–52 (2008)
Timmis, J., Hone, A., Stibor, T., Clark, E.: Theoretical advances in artifical immune systems. Theoretical Computer Science 403(1), 11–32 (2008)
Wierzchoń, S.T.: Generating optimal repertoire of antibody strings in an artificial immune system. In: Kłopotek, M.A., Michalewicz, M., Wierzchoń, S.T. (eds.) Proc. of the IIS 2000 Symposium on Intelligent Information Systems, Bystra, Poland, June 12-16, pp. 119–133. Springer (2000)
Wierzchoń, S.T.: Deriving concise description of non-self patterns in an artificial immune system. In: Jain, L.C., Kacprzyk, J. (eds.) New Learning Paradigm in Soft Comptuning, pp. 438–458. Physica-Verlag (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chmielewski, A., Wierzchoń, S.T. (2012). Hybrid Negative Selection Approach for Anomaly Detection. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds) Computer Information Systems and Industrial Management. CISIM 2012. Lecture Notes in Computer Science, vol 7564. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33260-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-33260-9_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33259-3
Online ISBN: 978-3-642-33260-9
eBook Packages: Computer ScienceComputer Science (R0)