Skip to main content

Artificial Immune Systems for Self-Nonself Discrimination: Application to Anomaly Detection

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 116))

Summary

Self-nonself discrimination is the ability of the vertebrate immune systems to distinguish between foreign objects and the body’s own self. It provides the basis for several biologically inspired approachs for classification. The negative selection algorithm, which is one way to implement self-nonself discrimination, is becoming increasingly popular for anomaly detection applications. Negative selection makes use of a set of detectors to detect anomalies in input data. This chapter describes two very successful negative selection algorithms, the self-organizing RNS algorithm and the V-detectors algorithm, which are useful with real valued data. It also proposes two new approaches, the single and the multistage proliferating V-detector algorithms to create such detectors. Comparisons with artificial fractal data as well as with real data pertaining to power distribution failure rates, shows that while the RNS and the V-detector algorithms can perform anomaly detection quite well, the proposed mechanism of proliferation entails a significant improvement over them, and can be very useful in anomaly detection tasks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Castro LND, Timmis J (2002) Artificial Immune Systems: A New Compu- tational Intelligence Approach. Springer-Verlag, London

    Google Scholar 

  2. Ji Z, Dasgupta D (2007) Revisiting negative selection algorithms. Evol Comp 15(2): 223–251

    Article  Google Scholar 

  3. Taylor DW, Corne DW (2003) An investigation of the negative selection algorithm for fault detection in refrigeration systems. In: LNCS Artificial Immune Systems. Springer, Berlin Heidelberg New York 2787: 34–45

    Google Scholar 

  4. Dasgupta D, KrishnaKumar K, Wong D, Berry M (2004) Negative selection algorithm for aircraft fault detection. In: LNCS Artificial Immune Systems. Springer, Berlin Heidelberg New York 3239: 1–13

    Google Scholar 

  5. Gui M, Das S, Pahwa A (2007) Procreating V-detectors for nonself recognition: An application to anomaly detection in power systems. Proc Gen Evol Comp Conf (GECCO): 261–268

    Google Scholar 

  6. Ji Z, Dasgupta D (2006) Applicability issues of the real-valued negative selection algorithms. Proc Gen Evol Comp Conf (GECCO): 111–118

    Google Scholar 

  7. Branco PJC, Dente JA, Mendes RV (2003) Using immunology principles for fault detection. IEEE Trans Ind Electron 50(2): 362–373

    Article  Google Scholar 

  8. Dasgupta D, Yu S, Majumdar N (2003) MILA – Multi-level Immune Learning Algorithm and its application to anomaly detection. Soft Comp J 9(3): 172–184

    Article  Google Scholar 

  9. Nunn I, White T (2005) The application of antigenic search techniques to time series forecasting. Proc Gen Evol Comp Conf (GECCO): 353–360

    Google Scholar 

  10. Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Trans Evol Comp 6(3): 281–291

    Article  Google Scholar 

  11. Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comp 6(3): 252–280

    Article  Google Scholar 

  12. Nio F, Gmez D, Wong D, Vejar R (2003) A novel immune anomaly detection technique based on negative selection. In: LNCS Artificial Immune Systems. Springer, Berlin Heidelberg New York 2723: 204

    Google Scholar 

  13. Ji Z, Dasgupta D (2004) Real valued negative selection algorithm using variable-sized detectors. Proc Gen Evol Comp Conf (GECCO) 3102: 287–298

    Google Scholar 

  14. Dasgupta D, Gonzalez F (2003) Anomaly detection using real-valued negative selection. Gen Prog Evol Mach 4(4): 383–403

    Article  Google Scholar 

  15. Ji Z (2005) A boundary aware negative selection algorithm. Proc 9th IASTED Int Conf Art Intell Soft Comp

    Google Scholar 

  16. Sahai S, Pahwa A (2004) Failures of overhead distribution system lines due to animals. Proc N Am Power Symp Moscow Idaho

    Google Scholar 

  17. Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In TimmisJ, Bentley PJ (eds), Proc Int Conf Art Immune Syst (ICARIS). University of Kent at Canterbury 141–148

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Das, S., Gui, M., Pahwa, A. (2008). Artificial Immune Systems for Self-Nonself Discrimination: Application to Anomaly Detection. In: Liu, Y., Sun, A., Loh, H.T., Lu, W.F., Lim, EP. (eds) Advances of Computational Intelligence in Industrial Systems. Studies in Computational Intelligence, vol 116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78297-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78297-1_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78296-4

  • Online ISBN: 978-3-540-78297-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics