Abstract
In this paper we introduce a method of using a pair of complementary negative detectors. When both self and non-self antigens are given, we can build a pair of complementary negative detectors using self and non-self antigens respectively and augment the results given by the detectors. When self or non-self antigens change over time, antibodies of a negative detector that gives a false positive error for the change, are used to fill the holes of the other negative detector giving a false negative error. They try to adapt to the change in complementary ways.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Timmis, J., Neal, M.: Investigating the Evolution and Stability of a Resource Limited Artificial Immune System. In: Proc. of the Genetic and Evolutionary Compuation Conference,Workshop on Artificial Immune Systems and Their Applications, pp. 40–41 (2000)
Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos (1994)
Chao, D., Forrest, S.: Information Immune System. In: Timmis, J., Bentley, P.J. (eds.) Proc. of ICARIS 2002, pp. 132–140 (2002)
Esponda, F., Forrest, S., Helman, P.: A Formal Framework for Positive and Negative Detection Schemes, http://www.cs.unm.edu/immsec/publications/PositiveandNegativeDetection.pdf
Williamson, M.M.: Biologically inspired approaches to computer security, Tech. Rep. HPL-2002-131, HP Laboratories (June 2002)
Ayara, M., Timmis, J., De Lemos, R., de Castro, L., Duncan, R.: Negative Selection: How to Generate Detectors. In: Timmis, J., Bentley, P.J. (eds.) Proc. of ICARIS 2002, pp. 89–98 (2002)
Wierzchon, S.: Generating Optimal Repertoire of Antibody Strings in an Artificail Immune System. In: Klopotek, M.A., Michalewicz, M., Wierzchon, S.T. (eds.) Intelligent Information Systems. Advances in Soft Computing Series. Physica-Verlag/Springer, Heidelberg/ New York (2000)
I.B.M. (2002), http://www.research.ibm.com/antivirus/
Mail Abuse Prevention System: Definition of SPAM, http://mailabuse.org/standard.html
de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Ingelligence Approach. Springer, Heidelberg (2002)
D’haeseleer, P., Forrest, S., Helman, P.: An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ceong, H.T., Kim, Yi., Lee, D., Lee, KH. (2003). Complementary Dual Detectors for Effective Classification. In: Timmis, J., Bentley, P.J., Hart, E. (eds) Artificial Immune Systems. ICARIS 2003. Lecture Notes in Computer Science, vol 2787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45192-1_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-45192-1_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40766-9
Online ISBN: 978-3-540-45192-1
eBook Packages: Springer Book Archive