Skip to main content

Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius

  • Conference paper
Information Computing and Applications (ICICA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7473))

Included in the following conference series:

Abstract

Negative selection algorithm (NSA) generates the detectors based on the self space. Due to the drawbacks of the current representation of the self space in NSAs, the generated detectors cannot enough cover the non-self space and at the same time, cover some of the self space. In order to overcome the drawbacks, a new scheme of the representation of the self space is introduced with variable-sized self radius, which is called VSRNSA. Using the variable-sized self radius to represent the self space, we can generate the more quality detectors. The algorithm is tested using the well-known real world datasets; preliminary results show that the new approach enhances NSAs in increasing detection rates and decrease false alarm rates, and without increase in complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. de Castro, L., Zuben, F.: Artificial Immune Systems: Part I – Basic Theory and Applications. TR – DCA 01/99 (1999)

    Google Scholar 

  2. Zhang, F.B., Yue, X., Wang, D.W., Xi, L.: A Principal Components Weighted Real-valued Negative Selection Algorithm. International Journal of Digital Content Technology and its Applications 5(6), 313–324 (2011)

    Article  Google Scholar 

  3. Zhang, F.Y., Qi, D.Y.: Run-time malware detection based on positive selection. Journal in Computer Virology 7(4), 267–277 (2011)

    Article  Google Scholar 

  4. Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Manzoor, S., Shafiq, M.Z., Tabish, S.M., Farooq, M.: A Sense of ‘Danger’ for Windows Processes. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol. 5666, pp. 220–233. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Dervovic, D., Zuniga-Pflucker, J.C.: Positive selection of T cells, an in vitro view. Semin. Immunol. 22(5), 276–286 (2010)

    Article  Google Scholar 

  7. de Castro, L., Zuben, F.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation 6(3), 239–251 (2002)

    Article  Google Scholar 

  8. Berna, H.U., Sadan, K.K.: A review of clonal selection algorithm and its applications. Artificial Intelligence Review 36(2), 117–138 (2011)

    Article  Google Scholar 

  9. Al-Enezi, J.R., Abbod, M.F., Alsharhan, S.: Artificial Immune Systems-models, algorithms and applications. International Journal of Research and Reviews in Applied Sciences 3(2), 118–131 (2010)

    Google Scholar 

  10. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press (1994)

    Google Scholar 

  11. Dai, H., Yang, Y., Li, C.: Distance Maintaining Compact Quantum Crossover Based Clonal Selection Algorithm. JCIT 5(10), 56–65 (2010)

    Article  Google Scholar 

  12. Stibor, T., Timmis, J., Eckert, C.: A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 262–275. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Zhou, J., Dasgupta, D.: Applicability issues of the real-valued negative selection algorithms. In: Proceedings of Genetic and Evolutionary Computation Conference (2006)

    Google Scholar 

  14. Gonzalez, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines 4, 383–403 (2003)

    Article  Google Scholar 

  15. Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004, Part I. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zeng, J., Tang, W., Liu, C., Hu, J., Peng, L. (2012). Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. In: Liu, B., Ma, M., Chang, J. (eds) Information Computing and Applications. ICICA 2012. Lecture Notes in Computer Science, vol 7473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34062-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34062-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34061-1

  • Online ISBN: 978-3-642-34062-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics