Skip to main content

Fault Detection Algorithm for Telephone Systems Based on the Danger Theory

  • Conference paper
Artificial Immune Systems (ICARIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3627))

Included in the following conference series:

Abstract

This work is aimed at presenting a fault detection algorithm composed of multiple interconnected modules, and operating according to the paradigm supported by the danger theory in immunology. This algorithm attempts to achieve significant features that a fault detection system is supposed to have when monitoring a telephone profile system. These features would basically be adaptability due to the strong variation that operational conditions may exhibit over time, and the decrease in the number of false positives, which can be generated when any abnormal behavior is erroneously classified as being a fault. Simulated scenarios have been conceived to validate the proposal, and the obtained results are then analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Atamas, S.P.: Les affinities electives. Dossier Pour La Science 46 (2005)

    Google Scholar 

  3. Ayara, M., Timmis, J., De Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: 1st International Conference on AIS (ICARIS 2002), pp. 89–98 (2002)

    Google Scholar 

  4. Bersini, H.: Self-Assertion versus Self-Recognition: A Tribute to Francisco Varela. In: 1st International Conference on AIS (ICARIS 2002), pp. 107–112 (2002)

    Google Scholar 

  5. de Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation 6(3), 239–251 (2002)

    Article  Google Scholar 

  6. Faynberg, I., Lawrence, G., Lu, H.-L.: Converged networks and services: Internetworking IP and the PSTN. John Wiley & Sons, New York (2000)

    Google Scholar 

  7. González, F.A., Dasgupta, D.: An Immunogenetic Technique to Detect Anomalies in Network Traffic. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1081–1088 (2002)

    Google Scholar 

  8. Hersent, O., Petit, J.P.: IP Telephony: Packet-Based Multimedia Communications Systems. Addison-Wesley, Reading (1999)

    Google Scholar 

  9. Matzinger, P.: Tolerance Danger and the Extended Family. Annual Review of Immunology 12, 991–1045 (1994)

    Article  Google Scholar 

  10. Sarafijanovic, S., Boudec, J.: An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Secker, A., Freitas, A.A., Timmis, J.: A Danger Theory Inspired Approach to Web Mining. In: 2nd International Conference on AIS, pp. 156–167 (2003)

    Google Scholar 

  12. Schapire, R.E., Freund, Y., Bartlett, P., Lee, W.S.: Boosting the margin: A new explanation for the effectiveness of voting methods. The Annals of Statistics 26(5), 1651–1686 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  13. Venkatasubramanian, V., Rengaswamy, R., Yin, K., Kavuri, S.N.: A review of process fault detection and diagnosis: part I – Quantitative model-based methods. Computer and Chemical Engineering 27, 293–311 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pinto, J.C.L., Von Zuben, F.J. (2005). Fault Detection Algorithm for Telephone Systems Based on the Danger Theory. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds) Artificial Immune Systems. ICARIS 2005. Lecture Notes in Computer Science, vol 3627. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11536444_32

Download citation

  • DOI: https://doi.org/10.1007/11536444_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28175-7

  • Online ISBN: 978-3-540-31875-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics