Skip to main content

Comparative Performance Analysis of Negative Selection Algorithm with Immune and Classification Algorithms

  • Conference paper
Recent Advances on Soft Computing and Data Mining

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 287))

Abstract

The ability of Negative Selection Algorithm (NSA) to solve a number of anomaly detection problems has proved to be effective. This paper thus presents an experimental study of negative selection algorithm with some classification algorithms. The purpose is to ascertain their efficiency rates in accurately detecting abnormalities in a system when tested with well-known datasets. Negative selection algorithm with some selected immune and classifier algorithms are used for experimentation and analysis. Three different datasets have been acquired for this task and a comparison performance executed. The empirical results illustrates that the artificial immune system of negative selection algorithm can achieve highest detection and lowest false alarm. Thus, it signifies the suitability and potentiality of NSA for discovering unusual changes in normal behavioral flow.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212. IEEE (1994)

    Google Scholar 

  2. Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51(12), 3448–3470 (2007)

    Article  Google Scholar 

  3. Boukerche, A., Machado, R.B., Jucá, K.R., Sobral, J.B.M., Notare, M.S.: An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Computer Communications 30(13), 2649–2660 (2007)

    Article  Google Scholar 

  4. Dasgupta, D., González, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6(3), 281–291 (2002)

    Article  Google Scholar 

  5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41(3), 15 (2009)

    Article  Google Scholar 

  6. Tamberi, F.: Anomaly detection (2007)

    Google Scholar 

  7. Edgeworth, F.: On discordant observations. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 23(143), 364–375 (1887)

    Article  MATH  Google Scholar 

  8. Vasarhelyi, M.A., Issa, H.: Application of anomaly detection techniques to identify fraudulent refunds (2011)

    Google Scholar 

  9. Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Transactions on Knowledge and Data Engineering 19(5), 631–645 (2007)

    Article  Google Scholar 

  10. Yao, Y., Sharma, A., Golubchik, L., Govindan, R.: Online anomaly detection for sensor systems: A simple and efficient approach. Performance Evaluation 67(11), 1059–1075 (2010)

    Article  Google Scholar 

  11. Amer, M., Abdennadher, S.: Comparison of unsupervised anomaly detection techniques. PhD thesis, Bachelor’s Thesis 2011 (2011), http://www.madm.eu/_media/theses/thesis-amer.pdf

  12. Kumar, R., Verma, R.: Classification algorithms for data mining: A survey. International Journal of Innovations in Engineering and Technology (IJIET) (2012)

    Google Scholar 

  13. Kilany, R.M.: Efficient classification and prediction algorithms for biomedical information (2013)

    Google Scholar 

  14. Weiss, S.M., Kulikowski, C.A.: Computer systems that learn: Classification and prediction methods from statistics, neural nets, machine learning and expert systems (1991)

    Google Scholar 

  15. Gonzalez, F., Dasgupta, D., Kozma, R.: Combining negative selection and classification techniques for anomaly detection. In: Proceedings of the 2002 Congress on Evolutionary Computation, CEC 2002, vol. 1, pp. 705–710. IEEE (2002)

    Google Scholar 

  16. Rao, K.H., Srinivas, G., Damodhar, A., Krishna, M.V.: Implementation of anomaly detection technique using machine learning algorithms. International Journal of Computer Science and Telecommunications, ISSN 2047–3338

    Google Scholar 

  17. Lederberg, J.: Genes and antibodies do antigens bear instructions for antibody specificity or do they select cell lines that arise by mutation? Science 129(3364), 1649–1653 (1959)

    Article  Google Scholar 

  18. Textor, J.: A comparative study of negative selection based anomaly detection in sequence data. In: Coello Coello, C.A., Greensmith, J., Krasnogor, N., Liò, P., Nicosia, G., Pavone, M. (eds.) ICARIS 2012. LNCS, vol. 7597, pp. 28–41. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. Lasisi, A., Ghazali, R., Herawan, T.: Negative selection algorithm: A survey on the epistemology of generating detectors. In: Herawan, T., Deris, M.M., Abawajy, J. (eds.) Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng 2013). LNEE, vol. 285, pp. 167–176. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  20. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4), 443–473 (2000)

    Article  Google Scholar 

  21. Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and k-cnf satisfiability. In: IEEE Congress on Evolutionary Computation, CEC 2006, pp. 491–498. IEEE (2006)

    Google Scholar 

  22. D’Haeseleer, P., Forrest, S., et al.: An immunological approach to change detection. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA (1996)

    Google Scholar 

  23. Majd, Mahshid, A.H., Hashemi, S.: A polymorphic convex hull scheme for negative selection algorithms. International Journal of Innovative Computing, Information and Control 8(5A), 2953–2964 (2012)

    Google Scholar 

  24. D’Haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: Algorithms, analysis and implications. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 110–119. IEEE (1996)

    Google Scholar 

  25. Wierzchon, S.T.: Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science & Technology 1(3), 1–13 (2000)

    Google Scholar 

  26. de Castro, L.N., Timmis, J.: Artificial immune systems: a new computational intelligence approach. Springer (2002)

    Google Scholar 

  27. Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative selection: How to generate detectors. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), Canterbury, UK:[sn], vol. 1, pp. 89–98 (2002)

    Google Scholar 

  28. González, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines 4(4), 383–403 (2003)

    Article  Google Scholar 

  29. Gonzalez, F., Dasgupta, D.: Neuro-immune and self-organizing map approaches to anomaly detection: A comparison. In: First International Conference on Artificial Immune Systems, pp. 203–211 (2002)

    Google Scholar 

  30. Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  31. Brownlee, J.: Artificial immune recognition system (airs)-a review and analysis. Swinburne University of Technology, Melbourne, Australia. Tech. Rep. (1-02) (2005)

    Google Scholar 

  32. Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (airs): An immune-inspired supervised learning algorithm. Genetic Programming and Evolvable Machines 5(3), 291–317 (2004)

    Article  Google Scholar 

  33. Watkins, A., Timmis, J.: Artificial immune recognition system (airs): Revisions and refinements. In: AISB 2004 Convention, p. 18 (2002)

    Google Scholar 

  34. Watkins, A., Timmis, J.: Exploiting parallelism inherent in AIRS, an artificial immune classifier. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 427–438. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  35. De Castro, L.N., Von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Transactions on Evolutionary Computation 6(3), 239–251 (2002)

    Article  Google Scholar 

  36. Brownlee, J.: Immunos-81 the misunderstood artificial immune system, ciscp, faculty of ict, swinburne university of technology. Technical report, Australia, Technical Report 1-02 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayodele Lasisi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Lasisi, A., Ghazali, R., Herawan, T. (2014). Comparative Performance Analysis of Negative Selection Algorithm with Immune and Classification Algorithms. In: Herawan, T., Ghazali, R., Deris, M. (eds) Recent Advances on Soft Computing and Data Mining. Advances in Intelligent Systems and Computing, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-319-07692-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07692-8_42

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07691-1

  • Online ISBN: 978-3-319-07692-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics