Abstract
Immune-based algorithms are mainly used for detecting anomalies in datasets from various domains. However, one of the main areas in which they are applied is computer security. Due to increased number of victim connections, a new effective approaches still are needed. Negative Selection Algorithms seem to be very interesting as they have a unique feature which allow for detecting new type of attacks. This paper presents the possibility of applying the rough sets inspirations to improve its efficiency and deal with uncertainty and inconsistency in data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The universe is assumed to be finite since some formulas introduced in this paper do not hold for infinite sets, see e.g. the standard rough inclusion function.
- 2.
Here, concept is understood as a subset of the universe.
References
Aggarwal, C.C., Hinneburg, A., Keim, D.A.: On the surprising behavior of distance metrics in high dimensional space. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 420–434. Springer, Heidelberg (2001). doi:10.1007/3-540-44503-X_27
Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, 9–13, pp. 3–10, July 2002
Chmielewski, A., Wierzchoń, S.T.: On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Białostockiej 2, 39–50 (2007)
Chmielewski, A., Wierzchoń, S.T.: Hybrid negative selection approach for anomaly detection. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 242–253. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33260-9_21
Félix, R., Ushio, T.: Rough lymphocytes for approximate binding in artificial immune systems. In: 15th International Conference on Electronics, Communications and Computers (CONIELECOMP 2005), Puebla, Mexico, pp. 272–277 (2005)
Fernandes, D.A.B., Freire, M.M., Fazendeiro, P.A.P., Incio, P.R.M.: Applications of artificial immune systems to computer security: a survey. J. Inf. Secur. Appl. 35, 138–159 (2017)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 120–128. IEEE Computer Society Press (1996)
Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202–212 (1994)
Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 6, 252–280 (2002)
Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evol. Comput. J. 8(4), 443–473 (2000)
Hońko, P.: Compound approximation spaces for relational data. Int. J. Approx. Reason. 71, 89–111 (2016)
Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K. (ed.) GECCO 2004. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24854-5_30
Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evol. Comput. 15(2), 223–251 (2007)
Pawlak, Z.: Rough Sets: Theoretical Aspects of Reasoning about Data. Kluwer Academic, Dordrecht (1991)
Shen, J., Wang, J., Ai, H.: An improved artificial immune system-based network intrusion detection by using rough set. Commun. Netw. 4, 41–47 (2012)
Stepaniuk, J.: Rough set data mining of diabetes data. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1999. LNCS, vol. 1609, pp. 457–465. Springer, Heidelberg (1999). doi:10.1007/BFb0095133
Stibor, T.: Phase transition and the computational complexity of generating r-contiguous detectors. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol. 4628, pp. 142–155. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73922-7_13
Wierzchoń, S.T.: Generating optimal repertoire of antibody strings in an artificial immune system. In: Kłopotek, M.A., Michalewicz, M., Wierzchoń, S.T. (eds.) Intelligent Information Systems. AINSC, pp. 119–133. Physica, Heidelberg (2000). doi:10.1007/978-3-7908-1846-8_12
Acknowledgments
This research was partially supported by the grant S/WI/3/13 of the Polish Ministry of Science and Higher Education. I would like to thank Piotr Hońko for his valuable comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chmielewski, A. (2017). Application of Rough Sets to Negative Selection Algorithms. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2017. Lecture Notes in Computer Science(), vol 10646. Springer, Cham. https://doi.org/10.1007/978-3-319-70004-5_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-70004-5_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70003-8
Online ISBN: 978-3-319-70004-5
eBook Packages: Computer ScienceComputer Science (R0)