Skip to main content

Application of Rough Sets to Negative Selection Algorithms

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10646))

Abstract

Immune-based algorithms are mainly used for detecting anomalies in datasets from various domains. However, one of the main areas in which they are applied is computer security. Due to increased number of victim connections, a new effective approaches still are needed. Negative Selection Algorithms seem to be very interesting as they have a unique feature which allow for detecting new type of attacks. This paper presents the possibility of applying the rough sets inspirations to improve its efficiency and deal with uncertainty and inconsistency in data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The universe is assumed to be finite since some formulas introduced in this paper do not hold for infinite sets, see e.g. the standard rough inclusion function.

  2. 2.

    Here, concept is understood as a subset of the universe.

References

  1. Aggarwal, C.C., Hinneburg, A., Keim, D.A.: On the surprising behavior of distance metrics in high dimensional space. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 420–434. Springer, Heidelberg (2001). doi:10.1007/3-540-44503-X_27

    Chapter  Google Scholar 

  2. Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, 9–13, pp. 3–10, July 2002

    Google Scholar 

  3. Chmielewski, A., Wierzchoń, S.T.: On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Białostockiej 2, 39–50 (2007)

    Google Scholar 

  4. Chmielewski, A., Wierzchoń, S.T.: Hybrid negative selection approach for anomaly detection. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 242–253. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33260-9_21

    Chapter  Google Scholar 

  5. Félix, R., Ushio, T.: Rough lymphocytes for approximate binding in artificial immune systems. In: 15th International Conference on Electronics, Communications and Computers (CONIELECOMP 2005), Puebla, Mexico, pp. 272–277 (2005)

    Google Scholar 

  6. Fernandes, D.A.B., Freire, M.M., Fazendeiro, P.A.P., Incio, P.R.M.: Applications of artificial immune systems to computer security: a survey. J. Inf. Secur. Appl. 35, 138–159 (2017)

    Google Scholar 

  7. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 120–128. IEEE Computer Society Press (1996)

    Google Scholar 

  8. Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202–212 (1994)

    Google Scholar 

  9. Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 6, 252–280 (2002)

    Article  Google Scholar 

  10. Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evol. Comput. J. 8(4), 443–473 (2000)

    Article  Google Scholar 

  11. Hońko, P.: Compound approximation spaces for relational data. Int. J. Approx. Reason. 71, 89–111 (2016)

    Article  MATH  MathSciNet  Google Scholar 

  12. Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K. (ed.) GECCO 2004. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24854-5_30

    Chapter  Google Scholar 

  13. Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evol. Comput. 15(2), 223–251 (2007)

    Article  Google Scholar 

  14. Pawlak, Z.: Rough Sets: Theoretical Aspects of Reasoning about Data. Kluwer Academic, Dordrecht (1991)

    Book  MATH  Google Scholar 

  15. Shen, J., Wang, J., Ai, H.: An improved artificial immune system-based network intrusion detection by using rough set. Commun. Netw. 4, 41–47 (2012)

    Article  Google Scholar 

  16. Stepaniuk, J.: Rough set data mining of diabetes data. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1999. LNCS, vol. 1609, pp. 457–465. Springer, Heidelberg (1999). doi:10.1007/BFb0095133

    Chapter  Google Scholar 

  17. Stibor, T.: Phase transition and the computational complexity of generating r-contiguous detectors. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol. 4628, pp. 142–155. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73922-7_13

    Chapter  Google Scholar 

  18. Wierzchoń, S.T.: Generating optimal repertoire of antibody strings in an artificial immune system. In: Kłopotek, M.A., Michalewicz, M., Wierzchoń, S.T. (eds.) Intelligent Information Systems. AINSC, pp. 119–133. Physica, Heidelberg (2000). doi:10.1007/978-3-7908-1846-8_12

    Chapter  Google Scholar 

Download references

Acknowledgments

This research was partially supported by the grant S/WI/3/13 of the Polish Ministry of Science and Higher Education. I would like to thank Piotr Hońko for his valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrzej Chmielewski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chmielewski, A. (2017). Application of Rough Sets to Negative Selection Algorithms. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2017. Lecture Notes in Computer Science(), vol 10646. Springer, Cham. https://doi.org/10.1007/978-3-319-70004-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70004-5_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70003-8

  • Online ISBN: 978-3-319-70004-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics