Abstract
Negative selection algorithm (NSA) generates the detectors based on the self space. Due to the drawbacks of the current representation of the self space in NSAs, the generated detectors cannot enough cover the non-self space and at the same time, cover some of the self space. In order to overcome the drawbacks, a new scheme of the representation of the self space is introduced with variable-sized self radius, which is called VSRNSA. Using the variable-sized self radius to represent the self space, we can generate the more quality detectors. The algorithm is tested using the well-known real world datasets; preliminary results show that the new approach enhances NSAs in increasing detection rates and decrease false alarm rates, and without increase in complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
de Castro, L., Zuben, F.: Artificial Immune Systems: Part I – Basic Theory and Applications. TR – DCA 01/99 (1999)
Zhang, F.B., Yue, X., Wang, D.W., Xi, L.: A Principal Components Weighted Real-valued Negative Selection Algorithm. International Journal of Digital Content Technology and its Applications 5(6), 313–324 (2011)
Zhang, F.Y., Qi, D.Y.: Run-time malware detection based on positive selection. Journal in Computer Virology 7(4), 267–277 (2011)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)
Manzoor, S., Shafiq, M.Z., Tabish, S.M., Farooq, M.: A Sense of ‘Danger’ for Windows Processes. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol. 5666, pp. 220–233. Springer, Heidelberg (2009)
Dervovic, D., Zuniga-Pflucker, J.C.: Positive selection of T cells, an in vitro view. Semin. Immunol. 22(5), 276–286 (2010)
de Castro, L., Zuben, F.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation 6(3), 239–251 (2002)
Berna, H.U., Sadan, K.K.: A review of clonal selection algorithm and its applications. Artificial Intelligence Review 36(2), 117–138 (2011)
Al-Enezi, J.R., Abbod, M.F., Alsharhan, S.: Artificial Immune Systems-models, algorithms and applications. International Journal of Research and Reviews in Applied Sciences 3(2), 118–131 (2010)
Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press (1994)
Dai, H., Yang, Y., Li, C.: Distance Maintaining Compact Quantum Crossover Based Clonal Selection Algorithm. JCIT 5(10), 56–65 (2010)
Stibor, T., Timmis, J., Eckert, C.: A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 262–275. Springer, Heidelberg (2005)
Zhou, J., Dasgupta, D.: Applicability issues of the real-valued negative selection algorithms. In: Proceedings of Genetic and Evolutionary Computation Conference (2006)
Gonzalez, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines 4, 383–403 (2003)
Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004, Part I. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zeng, J., Tang, W., Liu, C., Hu, J., Peng, L. (2012). Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. In: Liu, B., Ma, M., Chang, J. (eds) Information Computing and Applications. ICICA 2012. Lecture Notes in Computer Science, vol 7473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34062-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-34062-8_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34061-1
Online ISBN: 978-3-642-34062-8
eBook Packages: Computer ScienceComputer Science (R0)