Skip to main content

An Extended Negative Selection Algorithm for Anomaly Detection

  • Conference paper
Advances in Knowledge Discovery and Data Mining (PAKDD 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3056))

Included in the following conference series:

Abstract

This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previously proposed negative selection algorithms which do not make use of non-self data, the extended negative selection algorithm first acquires prior knowledge about the characteristics of the Problem space from the historial sample data by using machine learning techniques. Such data consists of both self data and non-self data. The acquired prior knowledge is represented in the form of production rules and thus viewed as common schemata which characterise the two subspaces: self-subspace and non-self-subspace, and provide important information to the generation of detection rules. One advantage of our approach is that it does not rely on the structured representation of the data and can be applied to general anomaly detection. To test the effectiveness, we test our approach through experiments with the public data set iris and KDD’99 published data set.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4), 443–473 (2000)

    Article  Google Scholar 

  2. Dasgupta, D., Forrest, S.: Novelty detection in time series data using ideas from immunology. In: Proceedings of the International Conference on Intelligent Systems, June 1996, pp. 82–87 (1996)

    Google Scholar 

  3. Dasgupta, D., Gonzalez, F.: An immunity-based Technique to Characterize Intrusions in Computer Networks. IEEE transaction on evolutionary computation 6(3), 1081–1088 (2002)

    Google Scholar 

  4. Harmer, P.K., Williams, P.D., Gunch, G.H., Lamont, G.B.: An Artificial Immune System Architure for Computer Security Application. IEEE transaction on evolutionary computer 6(3) (June 2002)

    Google Scholar 

  5. Dasgupta, D., Forrest, S.: Artificial immune system in industrial application. In: The Proceeding of International conference on Intelligent Processing and Manufacturing Material (IPMM), Honolulu, HI, July 10-14 (1999)

    Google Scholar 

  6. Dasgupta, D., Forrest, S.: Novelty Detection in Time Series data using ideas from Immunology. In: The proceedings of the 5th International Conference on Intelligent Systems, Reno, June 19-21 (1996)

    Google Scholar 

  7. Twycross, J., Cayzer, S.: An Immune-based approach to document classification, http://citeseer.nj.nec.com/558965.html

  8. Forrest, S., Oerelson, A., Allen, L., Cherukuri, R.: Slef-nonself discrimination in a computer. In: The proceedings of IEEE symposium on research in security and privacy (1994)

    Google Scholar 

  9. Gonzalez, F.A., Dasgupta, D.: An Immunogenetic Technique to detect animalies in network traffic. In: The proceeding of GECCO 2002, pp. 1081–1088 (2002)

    Google Scholar 

  10. Gomez, J., Gonzalez, F., Dasgupta, D.: An Immune-Fuzzy Approach to Anomaly detection. In: Proceedings of The IEEE International Conference on Fuzzy Systems, St. Louis, MO (May 2003)

    Google Scholar 

  11. Gonzalez, F., Dasgupta, D., Nino, L.F.: A Randomized Real- Value Negative Selection Algorithm. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 261–272. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Ayara, M., Timmis, J., de Lemos, R., de Castro, L., Duncan, R.: Negative Selection: How to Generate Detectors. In: 1st ICARIS (2002)

    Google Scholar 

  13. Dasgupta, D., Ji, Z., Gonzalez, F.: Artificial Immune System Research in the last five years. In: The Proceedings of the international conference on Evolutionary Computation Conference (CEC), Canbara, Australia, December 8-12 (2003)

    Google Scholar 

  14. De Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clon, al Selection Principle. IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems 6(3), 239–251 (2002)

    Google Scholar 

  15. Kim, J., Bentley, P.: Negative selection and Niching by an artificial immune system for network intrusion detection. In: the proceeding of Genetic and Evolutionary Computation Conference (GECCO 1999), Orlando, Florida, July 13-17 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hang, X., Dai, H. (2004). An Extended Negative Selection Algorithm for Anomaly Detection. In: Dai, H., Srikant, R., Zhang, C. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2004. Lecture Notes in Computer Science(), vol 3056. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24775-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24775-3_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22064-0

  • Online ISBN: 978-3-540-24775-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics