Abstract
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previously proposed negative selection algorithms which directly construct detectors in the complementary space of self-data space, our approach first evolves a number of common schemata through coevolutionary genetic algorithm in self-data space, and then constructs detectors in the complementary space of the schemata. These common schemata characterize self-data space and thus guide the generation of detection rules. By converting data space into schema space, we can efficiently generate an appropriate number of detectors with diversity for anomaly detection. The approach is tested for its effectiveness through experiment with the published data set iris.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. IEEE transaction on Evolutionary Computation 8(4), 443–473 (2000)
Dasgupta, D., Gonzalez, F.: An immunity-based Technique to Characterize Intrusions in Computer Networks. IEEE transaction on evolutionary computation 6(3), 1081–1088 (2002)
Harmer, P.K., Williams, P.D., Gunch, G.H., Lamont, G.B.: An Artificial Immune System Architure for Computer Security Application. IEEE transaction on evolutionary computer 6(3) (June 2002)
Dasgupta, D., Forrest, S.: Artificial immune system in industrial application. In: The proceeding of International conference on Intelligent Processing and Manufacturing Material (IPMM), Honolulu, HI (July 10-14, 1999)
Dasgupta, D., Forrest, S.: Novelty Detection in Time Series data using ideas from Immunology. In: The proceedings of the 5th International Conference on Intelligent Systems, Reno (June 19-21, 1996)
Twycross, J., Cayzer, S.: An Immune-based approach to document classification. http://citeseer.nj.nec.com/558965.html
Forrest, S., Oerelson, A., Allen, L., cherukuri, R.: Slef-nonself discrimination in a computer. In: The proceedings of IEEE symposium on research in security and privacy (1994)
Gonzalez, F.A., Dasgupta, D.: An Immunogenetic Technique to detect animalies in network traffic. In: The proceeding of GECCO 2002, pp. 1081–1088 (2002)
Gomez, J., Gonzalez, F., Dasgupta, D.: An Immune- Fuzzy Approach to Anomaly detection. In: Proceedings of The IEEE International Conference on Fuzzy Systems, St. Louis, MO (May 2003)
Gonzalez, F., Dasgupta, D., Nino, L.F.: A Randomized Real-Value Negative Selection Algorithm. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 261–272. Springer, Heidelberg (2003)
Ayara, M., Timmis, J., de Lemos, R., deCastro, L., Duncan, R.: Negative Selection: How to Generate Detectors. In: 1st ICARIS (2002)
Dasgupta, D., Ji, Z., Gonzalez, F.: Artificial Immune System Research in the last five years. In: The proceedings of the international conference on Evolutionary Computation Conference (CEC), Canbara, Australia (December 8-12, 2003)
Kim, J., Bentley, P.: Negative selection and Niching by an artificial immune system for network intrusion detection. In: The proceeding of Genetic and Evolutionary Computation Conference (GECCO 1999), Orlando, Florida (July 13-17, 1999)
Poli, R., Langdon, W.B.: Schema theory for genetic programming with onepoint crossover and point mutation. Evolutionary Computation 6(3), 231–252 (1998)
Forrest, S., Javornik, B., Smith, R.E., Perelson, A.S.: Using genetic algorithm to explore pattern recognition in the immune system. Evolutionary Computation 1(3), 191–211 (1993)
Potter, M.A., Jong, K.A.D.: The Coevolution of Antibodies for concept Learning. In: The proceeding of the fifth international conference on parallel problem solving form nature, Amsterdam, The Netherlands (September 1998)
Potter, M.A., De Jong, K.A., Grefenstette, J.J.: A coevolutionary approach to learning sequential decision rules. In: Eshelman, L.J. (ed.) Proceedings of the 6th International Conference on Genetic Algorithms (ICGA 1995), pp. 366–372. Morgan Kaufmann Publishers, San Francisco (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hang, X., Dai, H. (2004). Constructing Detectors in Schema Complementary Space for Anomaly Detection. In: Deb, K. (eds) Genetic and Evolutionary Computation – GECCO 2004. GECCO 2004. Lecture Notes in Computer Science, vol 3102. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24854-5_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-24854-5_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22344-3
Online ISBN: 978-3-540-24854-5
eBook Packages: Springer Book Archive