Abstract
This work is aimed at presenting a fault detection algorithm composed of multiple interconnected modules, and operating according to the paradigm supported by the danger theory in immunology. This algorithm attempts to achieve significant features that a fault detection system is supposed to have when monitoring a telephone profile system. These features would basically be adaptability due to the strong variation that operational conditions may exhibit over time, and the decrease in the number of false positives, which can be generated when any abnormal behavior is erroneously classified as being a fault. Simulated scenarios have been conceived to validate the proposal, and the obtained results are then analyzed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Atamas, S.P.: Les affinities electives. Dossier Pour La Science 46 (2005)
Ayara, M., Timmis, J., De Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: 1st International Conference on AIS (ICARIS 2002), pp. 89–98 (2002)
Bersini, H.: Self-Assertion versus Self-Recognition: A Tribute to Francisco Varela. In: 1st International Conference on AIS (ICARIS 2002), pp. 107–112 (2002)
de Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation 6(3), 239–251 (2002)
Faynberg, I., Lawrence, G., Lu, H.-L.: Converged networks and services: Internetworking IP and the PSTN. John Wiley & Sons, New York (2000)
González, F.A., Dasgupta, D.: An Immunogenetic Technique to Detect Anomalies in Network Traffic. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1081–1088 (2002)
Hersent, O., Petit, J.P.: IP Telephony: Packet-Based Multimedia Communications Systems. Addison-Wesley, Reading (1999)
Matzinger, P.: Tolerance Danger and the Extended Family. Annual Review of Immunology 12, 991–1045 (1994)
Sarafijanovic, S., Boudec, J.: An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)
Secker, A., Freitas, A.A., Timmis, J.: A Danger Theory Inspired Approach to Web Mining. In: 2nd International Conference on AIS, pp. 156–167 (2003)
Schapire, R.E., Freund, Y., Bartlett, P., Lee, W.S.: Boosting the margin: A new explanation for the effectiveness of voting methods. The Annals of Statistics 26(5), 1651–1686 (1998)
Venkatasubramanian, V., Rengaswamy, R., Yin, K., Kavuri, S.N.: A review of process fault detection and diagnosis: part I – Quantitative model-based methods. Computer and Chemical Engineering 27, 293–311 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pinto, J.C.L., Von Zuben, F.J. (2005). Fault Detection Algorithm for Telephone Systems Based on the Danger Theory. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds) Artificial Immune Systems. ICARIS 2005. Lecture Notes in Computer Science, vol 3627. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11536444_32
Download citation
DOI: https://doi.org/10.1007/11536444_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28175-7
Online ISBN: 978-3-540-31875-0
eBook Packages: Computer ScienceComputer Science (R0)