Abstract
Negative selection algorithms are important for artificial immune systems to produce detectors. But there are problems such as high time complexity, large number of detectors, a lot of redundant coverage between detectors in traditional negative selection algorithms, resulting in low efficiency for detectors’ generation and limitations in the application of immune algorithms. Based on the distribution of self set in morphological space, the algorithm proposed in this paper introduces the immune optimization mechanism, and produces candidate detectors hierarchically from far to near, with selves as the center. First, the self set is regarded as the evolution population. After immune optimization operations, detectors of the first level are generated which locate far away from the self space and cover larger non-self space, achieving that fewer detectors cover as much non-self space as possible. Then, repeat the process to obtain the second level detectors which locate close to detectors of the first level and near the self space and cover smaller non-self space, reducing detection loopholes. By analogy, qualified detector set will be obtained finally. In detectors’ generation process, the random production range of detectors is limited, and the self-reaction rate between candidate detectors is smaller, which effectively reduces the number of mature detectors and redundant coverage. Theoretical analysis demonstrates that the time complexity is linear with the size of self set, which greatly reduces the influence of growth of self scales over the time complexity. Experimental results show that IO-RNSA has better time efficiency and generation quality than classical negative selection algorithms, and improves detection rate and decreases false alarm rate.









Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Jin ZZ, Liao MH, Xiao G (2013) Survey of negative selection algorithms. J Commun 34(1):159–170
Dasgupta D, Yu S, Nino F (2011) Recent advances in artificial immune systems–models and applications. Appl Soft Comput 11:1574–1587
Stibor T, Timmis J, Eckert C (2005) On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system. In: Proceedings of IEEE evolutionary computation. IEEE Computer Society Press, Edinburgh, pp 995–1002
Timmis J, Hone A, Stibor T, Clark E (2008) Theoretical advances in artificial immune systems. Theor Comput Sci 403:11–32
Bretscher P, Cohn M (1970) A theory of self-nonself discrimination. Science 169:1042–1049
D’Haeseleer P, Forrest S, Helman P (1996) Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, Washington, pp 110–120
Sobh TS, Mostafa WM (2011) A cooperative immunological approach for detecting network anomaly. Applied Soft Computing 11:1275–1283
Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Trans Evol Comput 6(3):281–294
Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self–nonself discrimination in a computer. In: Proceeding of the IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Computer Society Press, pp 202–212
Balthrop J, Esponda F, Forrest S et al (2002) Coverage and generalization in an artificial immune system. GECCO 2002. Morgan Kaufmann Publishers Inc, New York, pp 3–10
Gonzalez F, Dasgupta D (2003) Anomaly detection using real-valued negative selection. Genet Program Evolvable Mach 4:383–403
Zhou J (2006) Negative selection algorithms: from the thymus to V-detector. Ph. D dissertation, University of Memphis, Memphis, TN, USA
Zhou J, Dasgupta D (2009) V-detector: an efficient negative selection algorithm with “probably adequate” detector coverage. Inf Sci 19(9):1390–1406
Joseph M, Shapir O, Gary B (2005) An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection[A]. GECCO 2005[C]. Washington DC, USA, pp 337–344
Ostaszewski M, Seredynski F, Bouvry P (2006) Immune anomaly detection enhanced with evolutionary paradigms. In: 8th annual conference on genetic and evolutionary computation (GECCO 2006), Seattle, Washington, USA
Zhang XM, Yi ZX, Song JS et al (2010) Research on negative selection algorithm based on matrix representation. J Electron Inf Technol 32(11):2701–2706
Gao XZ, Ovaska SJ, Wang X (2006) Genetic algorithms-based detector generation in negative selection algorithm. In: 2006 IEEE mountain workshop on adaptive and learning systems
Yang DY, Chen JY (2009) Research on detector generation algorithm based on multiple populations GA. Acta Automatica Sinica 35(4):425–432
Stibor T (2008) An empirical study of self/non-self discrimination in binary data with a kernel estimator. In: 7th international conference on artificial immune systems, Phuket, Thailand
Chen W, Liu XJ, Li T et al (2011) A negative selection algorithm based on hierarchical clustering of self set and its application in anomaly detection. Int J Comput Intell Syst 4 (4):410–419
Stibor T, Philipp M, Jonathan T (2005) Is negative selection appropriate for anomaly detection? In: Proceedings of IEEE Evolutionary Computation. IEEE Computer Society Press, Edinburgh, pp 569–576
Caldas B, Pita M, Buarque F (2007) How to obtain appropriate executive decisions using artificial immunologic systems. In: 6th international conference on artificial immune systems, Santos, Brazil
Ma W, Tran D, Sharma D (2008) Negative selection with antigen feedback in intrusion detection. In: 7th international conference on Artificial Immune Systems, Phuket, Thailand
Ou CM (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neuro Comput 88:78–86
UCI Dataset. http://archive.ics.uci.edu/ml/datasets
de Castro LN, Timmis J (2002) An artificial immune network for multimodal function optimization. In: IEEE world congress on evolutionary computation, pp 699–704
de Castro LN, Fernando J (2002) Learning and Optimization Using the Clonal Selection Principle. IEEE transactions on evolutionary computation. Special Issue on Artificial Immune Systems 6(3):239–251
Cai T, Ju SG, Zhong W (2009) A cutting based detector generating and matching algorithm. Acta Electronica Sinica 7(B04):131–134
Lasisi A, Ghazali R, Herawan T (2014) Negative selection algorithm: a survey on the epistemology of generating detectors. Lect Notes Electr Eng 285:167–176
Acknowledgments
This work has been supported by the National Natural Science Foundation of China under Grant No. 61173159, the National Natural Science Foundation of China under Grant No. 60873246, and the Cultivation Fund of the Key Scientific and Technical Innovation Project, Ministry of Education of China under Grant No. 708075.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xiao, X., Li, T. & Zhang, R. An immune optimization based real-valued negative selection algorithm. Appl Intell 42, 289–302 (2015). https://doi.org/10.1007/s10489-014-0599-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-014-0599-9