Skip to main content
Log in

Hybridization Schemes of the Fuzzy Dendritic Cell Immune Binary Classifier based on Different Fuzzy Clustering Techniques

  • Published:
New Generation Computing Aims and scope Submit manuscript

Abstract

The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm based on the behavior of natural dendritic cells. The DCA, as a binary classifier, classifies in a crisp manner each data item as either normal or anomalous. However, it was shown that DCA is sensitive to the input class data order. This problem was solved by the development of the fuzzy dendritic cell algorithm. The performance of the latter algorithm relies on its parameters tuning as this process is based on the use of a fuzzy clustering technique. We, thus, believe that the choice of the right fuzzy clustering technique is crucial for the system. In this paper, we try to review the fuzzy version of DCA and to investigate its performance when hybridized with different fuzzy clustering techniques. The aim of this hybridization is to select the most appropriate fuzzy clustering approach in order to generate an overall automated robust fuzzy DCA classifier.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Eiben, A. E. and Smith, J.E., Introduction to Evolutionary Computing, Natural Computing Series, 2nd edition, Springer, 2007.

  2. Hsua F., Huang P.: “Providing an appropriate search space to solve the fatigue problem in interactive evolutionary computation”. New Generation Computing 23, 115–127 (2005)

    Article  Google Scholar 

  3. Lewis M., Ruston K.: “Aesthetic geometry evolution in a generic interactive evolutionary design framework”. New Generation Computing 23, 171–179 (2005)

    Article  Google Scholar 

  4. Csorba M., Meling H., Heegaard E.: “A bio-inspired method for distributed deployment of services”. New Generation Computing 29, 185–222 (2011)

    Article  Google Scholar 

  5. Matzinger P.: “The danger model in it’s historical context”. Scandinavian Journal of Immunology 54, 4–9 (2001)

    Article  Google Scholar 

  6. Greensmith, J. and Aickelin, U., “Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection,” in Proc. of the 4th International Conference on Artificial Immune Systems, Springer, pp. 153–167, 2005.

  7. Greensmith, J., Aickelin, U. and Twycross, J., “Articulation and clarification of the dendritic cell algorithm,” in ICARIS, Springer, pp. 404–417, 2006.

  8. Greensmith, J. and Aickelin, U., “Further exploration of the dendritic cell algorithm,” in Proc. of the 6th International Conference on Artificial Immune Systems, Springer, pp. 142–153, 2007.

  9. Greensmith, J. and Aickelin, U., “The application of a dendritic cell algorithm to a robotic classifier,” in Proc. of the 6th International Conference on Artificial Immune Systems, Springer, pp. 204–215, 2007.

  10. Greensmith, J. and Aickelin, U., “The deterministic dendritic cell algorithm,” in ICARIS, pp. 291–302, 2008.

  11. Chelly, Z. and Elouedi, Z., “Further exploration of the fuzzy dendritic cell method,” in Proc. of the 10th International Conference of Artificial Immune Systems, Springer, pp. 419–432, 2011.

  12. Zadeh L.: “Fuzzy sets”. Information and Control 8, 338–353 (1965)

    Article  MATH  MathSciNet  Google Scholar 

  13. Dunn C.: “A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters”. Journal of Cybernetics 3, 32–57 (1973)

    Article  MATH  MathSciNet  Google Scholar 

  14. Zhou J.: “Revisiting negative selection algorithms”. Evolutionary Computation 15, 223–251 (2007)

    Article  Google Scholar 

  15. Stibor, T., “On the appropriateness of negative selection for anomaly detection and network intrusion detection,” Ph.D. thesis, Darmstadt University of Technology, 2006.

  16. Lutz, M. and Schuler, G., “Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?” Trends in Immunology, 23, pp. 991–1045, 2002.

  17. Greensmith J., Aickelin U., Tedesco G.: “Information fusion for anomaly detection with the dendritic cell algorithm”. Information Fusion 11, 21–34 (2010)

    Article  Google Scholar 

  18. Twycross, J., Greensmith, J. and Aickelin, U., “Dendritic cells for anomaly detection,” in Proc. of the Congress on Evolutionary Computation, pp. 664–671, 2006.

  19. Greensmith, J., Feyereisl, J. and Aickelin, U., “The dca:some comparison a comparative study between two biologically-inspired algorithms,” CoRR, abs/1006.1518, 2010.

  20. Al-Hammadi, Y., Aickelin, U. and Greensmith, J., “Dca for detecting bots,” in IEEE World Congress on Computational Intelligence, pp. 1807–1816, 2008.

  21. Kim, J., Bentley, P., Wallenta, C., Ahmed, M. and Hailes, S., “Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm,” in Evolutionary Intelligence: Special Issue on Artificial Immune Systems, 2008.

  22. Lay, N. and Bate, I., “Improving the reliability of real-time embedded systems using innate immune techniques,” in ICARIS, pp. 390–403, 2006.

  23. Asuncion, A. and Newman, D., Uci machine learning repository, http://www.ics.uci.edu/mlearn/, 2007.

  24. Greensmith, J., “The Dendritic Cell Algorithm,” Ph.D. thesis, University of Nottingham, 2007.

  25. Atkinson, A., Riani, M. and Cerioli, A., Exploring Multivariate Data with the Forward Search, Springer, 2004.

  26. Barros, C., Basgalupp, P., Carvalho, A. and Alex, A., “A survey of evolutionary algorithms for decision-tree induction,” IEEE Transactions on Systems, Man, and Cybernetics, 42, pp. 291–312, 2011.

  27. Greensmith, J. and Aickelin, U., “Dendritic cells for syn scan detection,” in Proc. of the Genetic and Evolutionary Computation Conference, ACM, pp. 49–56, 2007.

  28. Musselle, C., “Insights into the antigen sampling component of the dendritic cell algorithm,” Proc. of the 9th International Conference on Artificial Immune Systems, ICARIS’2010, Springer, pp. 88–101, 2010.

  29. Gu, F., Greensmith, J. and Aickelin, U., “Integrating real-time analysis with the dendritic cell algorithm through segmentation,” in GECCO, pp. 1203–1210, 2009.

  30. Fu, H. and Li, G., “Design of an immune-inspired danger theory model based on fuzzy set,” Proc. of International Symposium on Computational Intelligence and Design, 2008, IEEE, pp. 133–136, 2008.

  31. Fu, H. and Zhang, C., “Design of a danger signal detecting model based on fuzzy-set,” Proc. of 5th International Conference on Wireless communications, networking and mobile computing, 2009, IEEE, pp. 4566–4568, 2009.

  32. Amaral, M., “Fault detection in analog circuits using a fuzzy dendritic cell algorithm,” in ICARIS, pp. 18–21, 2011.

  33. Amaral, M., “Finding danger using fuzzy dendritic cells,” in Proc. Workshop on Hybrid Intelligent Models and Applications, pp. 21–27, 2011.

  34. Chelly, Z. and Elouedi, Z., “Fdcm: A fuzzy dendritic cell method,” in Proc. of the 9th International Conference of Artificial Immune Systems, Springer, pp. 102–115, 2010.

  35. Bezdek, C., Pattern Recognition with Fuzzy Objective Function Algorithms, Plenum Press, 1981.

  36. Gustafson, D. and Kessel, W., “Fuzzy clustering with a fuzzy covariance matrix,” in Proc. of the IEEE Conference on Decision and Control, IEEE, pp. 761–766, 1979.

  37. Dave, R., “Fuzzy shell clustering and application to circle detection in digital images,” International Journal of General Systems, 16, pp. 343–355, 1990.

  38. Dubes, R. and Jain, A., Algorithms for clustering data, Prentice-Hall, 1998.

  39. Ross, T. J., Fuzzy Logic with Engineering Applications, John Wiley & Sons, 3rd edition, 2004.

  40. Krishnapuram, R., Nasraoui, O. and Frigui, H., “Fuzzy and possibilistic shell clustering algorithms and their application to boundary detection and surface approximation,” IEEE Transactions on Neural Networks, 3, pp. 29–60, 1995.

  41. Dave, R., “Robust fuzzy clustering algorithms,” in Proc. of the 2nd IEEE International Conference on Fuzzy Systems, IEEE, pp. 1281–1286, 1993.

  42. Mamdani, H. and Assilian, S., “An experiment in linguistic synthesis with a fuzzy logic controller,” International Journal of Man-Machine Studies, 7, pp. 1–13, 1975.

  43. Broekhoven, E. and Baets, B., “Fast and accurate center of gravity defuzzification of fuzzy system outputs defined on trapezoidal fuzzy partitions,” Fuzzy Sets and Systems, 157, pp. 904–918, 2006.

  44. Nikhil R., Bezdek C., James C.: “On cluster validity for the fuzzy c-means model”. IEEE Transactions on Fuzzy Systems 3, 370–379 (1995)

    Article  Google Scholar 

  45. Xie, X. L. and Beni, G. A., “Validity measure for fuzzy clustering,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 3, pp. 841–846, 1991.

  46. MIT Lincoln Lab Information System Technology Group, The 1998 intrusion detection off-line evaluation plan, http://www.ll.mit.edu/IST/ideval/data/1998/.

  47. Kayacik, N., amd Zincir-Heywood, G. and Heywood, M., “Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets,” in Third Annual Conference on Privacy, Security and Trust (PST), 2005.

  48. Quinlan, J., C4.5: Programs for machine learning, Morgan Kaufmann, 1993.

  49. John, G. and Langley, P., “Estimating continuous distributions in bayesian classifiers,” in Proc. of the Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338–345, 1995.

  50. Kohavi, R., “Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid,” in Proc. of the Second International Conference on Knowledge Discovery and Data Mining, 1996.

  51. Breiman, L., “Random forests,” in Random Forests, p. 532, 2001.

  52. Aldous, D., “The continuum random tree,” in The Annals of Probability, p. 128, 1991.

  53. Ruck, D., Rogers, S., Kabrisky, M., Oxley, M. and Suter, B., “The multilayer perceptron as an approximation to a bayes optimaldiscriminant function,” in IEEE Transactions on Neural Networks, pp. 296–298, 1990.

  54. Chang, C. and Lin, C., “Libsvm: a library for support vector machines,” in Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeineb Chelly.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chelly, Z., Elouedi, Z. Hybridization Schemes of the Fuzzy Dendritic Cell Immune Binary Classifier based on Different Fuzzy Clustering Techniques. New Gener. Comput. 33, 1–31 (2015). https://doi.org/10.1007/s00354-015-0101-1

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00354-015-0101-1

Keywords

Navigation