Skip to main content

Constructing Detectors in Schema Complementary Space for Anomaly Detection

  • Conference paper
Genetic and Evolutionary Computation – GECCO 2004 (GECCO 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3102))

Included in the following conference series:

Abstract

This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previously proposed negative selection algorithms which directly construct detectors in the complementary space of self-data space, our approach first evolves a number of common schemata through coevolutionary genetic algorithm in self-data space, and then constructs detectors in the complementary space of the schemata. These common schemata characterize self-data space and thus guide the generation of detection rules. By converting data space into schema space, we can efficiently generate an appropriate number of detectors with diversity for anomaly detection. The approach is tested for its effectiveness through experiment with the published data set iris.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. IEEE transaction on Evolutionary Computation 8(4), 443–473 (2000)

    Google Scholar 

  2. Dasgupta, D., Gonzalez, F.: An immunity-based Technique to Characterize Intrusions in Computer Networks. IEEE transaction on evolutionary computation 6(3), 1081–1088 (2002)

    Google Scholar 

  3. Harmer, P.K., Williams, P.D., Gunch, G.H., Lamont, G.B.: An Artificial Immune System Architure for Computer Security Application. IEEE transaction on evolutionary computer 6(3) (June 2002)

    Google Scholar 

  4. Dasgupta, D., Forrest, S.: Artificial immune system in industrial application. In: The proceeding of International conference on Intelligent Processing and Manufacturing Material (IPMM), Honolulu, HI (July 10-14, 1999)

    Google Scholar 

  5. Dasgupta, D., Forrest, S.: Novelty Detection in Time Series data using ideas from Immunology. In: The proceedings of the 5th International Conference on Intelligent Systems, Reno (June 19-21, 1996)

    Google Scholar 

  6. Twycross, J., Cayzer, S.: An Immune-based approach to document classification. http://citeseer.nj.nec.com/558965.html

  7. Forrest, S., Oerelson, A., Allen, L., cherukuri, R.: Slef-nonself discrimination in a computer. In: The proceedings of IEEE symposium on research in security and privacy (1994)

    Google Scholar 

  8. Gonzalez, F.A., Dasgupta, D.: An Immunogenetic Technique to detect animalies in network traffic. In: The proceeding of GECCO 2002, pp. 1081–1088 (2002)

    Google Scholar 

  9. Gomez, J., Gonzalez, F., Dasgupta, D.: An Immune- Fuzzy Approach to Anomaly detection. In: Proceedings of The IEEE International Conference on Fuzzy Systems, St. Louis, MO (May 2003)

    Google Scholar 

  10. Gonzalez, F., Dasgupta, D., Nino, L.F.: A Randomized Real-Value Negative Selection Algorithm. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 261–272. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Ayara, M., Timmis, J., de Lemos, R., deCastro, L., Duncan, R.: Negative Selection: How to Generate Detectors. In: 1st ICARIS (2002)

    Google Scholar 

  12. Dasgupta, D., Ji, Z., Gonzalez, F.: Artificial Immune System Research in the last five years. In: The proceedings of the international conference on Evolutionary Computation Conference (CEC), Canbara, Australia (December 8-12, 2003)

    Google Scholar 

  13. Kim, J., Bentley, P.: Negative selection and Niching by an artificial immune system for network intrusion detection. In: The proceeding of Genetic and Evolutionary Computation Conference (GECCO 1999), Orlando, Florida (July 13-17, 1999)

    Google Scholar 

  14. Poli, R., Langdon, W.B.: Schema theory for genetic programming with onepoint crossover and point mutation. Evolutionary Computation 6(3), 231–252 (1998)

    Article  Google Scholar 

  15. Forrest, S., Javornik, B., Smith, R.E., Perelson, A.S.: Using genetic algorithm to explore pattern recognition in the immune system. Evolutionary Computation 1(3), 191–211 (1993)

    Article  Google Scholar 

  16. Potter, M.A., Jong, K.A.D.: The Coevolution of Antibodies for concept Learning. In: The proceeding of the fifth international conference on parallel problem solving form nature, Amsterdam, The Netherlands (September 1998)

    Google Scholar 

  17. Potter, M.A., De Jong, K.A., Grefenstette, J.J.: A coevolutionary approach to learning sequential decision rules. In: Eshelman, L.J. (ed.) Proceedings of the 6th International Conference on Genetic Algorithms (ICGA 1995), pp. 366–372. Morgan Kaufmann Publishers, San Francisco (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hang, X., Dai, H. (2004). Constructing Detectors in Schema Complementary Space for Anomaly Detection. In: Deb, K. (eds) Genetic and Evolutionary Computation – GECCO 2004. GECCO 2004. Lecture Notes in Computer Science, vol 3102. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24854-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24854-5_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22344-3

  • Online ISBN: 978-3-540-24854-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics