Skip to main content
Log in

NDAMM: a numerical differentiation-based artificial macrophage model for anomaly detection

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Anomaly detection is a significant issue that has attracted considerable research. The artificial immune system offers strong pattern recognition ability, adaptability and dynamic characteristics; therefore, it has been extensively used for anomaly detection. However, the boundary between normal and abnormal data patterns is difficult to define, which reduces the anomaly detection precisions of artificial immune approaches. Biological macrophages have a strong ability to identify various abnormalities, therefore, this study proposes a novel numerical differentiation-based artificial macrophage detection model (NDAMM) for anomaly detection. In particular, numerical differentiation is introduced in signal extraction, which can perceive signal changes more clearly and perform signal mapping. Furthermore, we design an artificial macrophage algorithm to determine weights based on input data and identify abnormalities using a signal fusion process. Finally, the proposed approach is implemented in anomaly detection. Through implementations on 20 anomaly detection datasets, the results of these experiments demonstrate that the NDAMM surpasses state-of-the-art anomaly detection methodologies. Ablation studies, parametric analysis, and statistical analysis are used to validate the effectiveness of our model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Fig. 3
Algorithm 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Chandola V, Banerjee A, Vipin Kumar (2009) Anomaly detection: a survey. ACM Comput Surveys (CSUR) 41(3):1–58

    Article  Google Scholar 

  2. Yu W, Zhao C (2019) Broad convolutional neural network based industrial process fault diagnosis with incremental learning capability. IEEE Trans Ind Electron 67(6):5081–5091

    Article  Google Scholar 

  3. Huang K, Tao Z, Liu Y, Sun B, Yang C, Gui W, Hu S (2022) Adaptive multimode process monitoring based on mode-matching and similarity-preserving dictionary learning. IEEE Trans Cybern:1–14

  4. Tajoddin A, Abadi M (2019) Ramd: registry-based anomaly malware detection using one-class ensemble classifiers. Appl Intell 49(7):2641–2658

    Article  Google Scholar 

  5. Bo Y, Yang M (2021) Data-driven network layer security detection model and simulation for the internet of things based on an artificial immune system. Neural Comput Appl 33(2):655–666

    Article  Google Scholar 

  6. Fatemifar S, Arashloo SR, Awais M, Kittler J (2019) Spoofing attack detection by anomaly detection. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 8464–8468

  7. Zhou W, Dong H, Liang Y (2020) The deterministic dendritic cell algorithm with haskell in earthquake magnitude prediction. Earth Sci Inf 13(2):447–457

    Article  Google Scholar 

  8. Zhou W, Yi WL, Ming Z, Dong HB (2020) Earthquake prediction model based on danger theory in artificial immunity. Neural Netw World 30(4):231–247

    Article  Google Scholar 

  9. Huang Y, Jin W, Yu Z, Li B (2021) A robust anomaly detection algorithm based on principal component analysis. Intell Data Anal 25(2):249–263

    Article  Google Scholar 

  10. Akpinar M, Fatih Adak M, Guvenc G (2021) Svm-based anomaly detection in remote working: intelligent software smartradar. Appl Soft Comput 109:107457

    Article  Google Scholar 

  11. Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7):1–35

    Article  Google Scholar 

  12. Reddy DK, Behera HS, Nayak J, Vijayakumar P, Naik B, Singh PK (2021) Deep neural network based anomaly detection in internet of things network traffic tracking for the applications of future smart cities. Trans Emerging Telecommun Technol 32(7):e4121

    Google Scholar 

  13. Lu L, Wang W, Zhang Z, Liu X (2020) A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowl-Based Syst 195:105648

    Article  Google Scholar 

  14. Gu X, Akoglu L, Rinaldo A (2019) Statistical analysis of nearest neighbor methods for anomaly detection. Adv Neural Inf Process Syst 32:1–11

    Google Scholar 

  15. Ergen T, Kozat SS (2020) Unsupervised anomaly detection with lstm neural networks. IEEE Trans Neural Netw Learn Syst 31(8):3127–3141

    Article  MathSciNet  Google Scholar 

  16. Wielgosz M, Skoczeń A, Matteis ED (2018) Protection of superconducting industrial machinery using rnn-based anomaly detection for implementation in smart sensor. Sensors 18(11):3933

    Article  Google Scholar 

  17. Li D, Liu S, Zhang H (2015) Negative selection algorithm with constant detectors for anomaly detection. Appl Soft Comput 36:618–632

    Article  Google Scholar 

  18. Abid A, Khan MT, De Silva CW (2017) Layered and real-valued negative selection algorithm for fault detection. IEEE Syst J 12(3):2960–2969

    Article  Google Scholar 

  19. Igbe O, Darwish I, Saadawi T (2017) Deterministic dendritic cell algorithm application to smart grid cyber-attack detection. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, pp 199–204

  20. Zhou W, Liang Y, Wang X, Ming Z, Xiao Z, Fan X (2022) Introducing macrophages to artificial immune systems for earthquake prediction. Appl Soft Comput 122:108822

    Article  Google Scholar 

  21. Yi WL, Ling CL, Ying C (2006) Preliminary digital differentiation of danger perception. J Harbin Eng Univ 27(B07):228–232

    Google Scholar 

  22. Ruff L, Kauffmann JR, Vandermeulen RA, Montavon G, Muller W (2021) A unifying review of deep and shallow anomaly detection. Proc IEEE 109(5):1–40

    Article  Google Scholar 

  23. Binbusayyis A, Vaiyapuri T (2021) Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class svm. Appl Intell 51(10):7094–7108

    Article  Google Scholar 

  24. Liu FT, Ting KM, Zhou Z-H (2012) Isolation-based anomaly detection. ACM Trans Knowl Discover Data (TKDD) 6(1):1–39

    Article  Google Scholar 

  25. Wang B, Mao Z (2020) A dynamic ensemble outlier detection model based on an adaptive k-nearest neighbor rule. Inf Fusion 63:30–40

    Article  Google Scholar 

  26. Li W, Cao J, Ma C, Wang J, Cui X, Chen P (2022) Eid-gan generative adversarial nets for extremely imbalanced data augmentation. IEEE Trans Industr Inf, (2022):3182781

  27. Andrea B, Andrea B, Michele L, Michela M, Luca B (2019) A semisupervised autoencoder-based approach for anomaly detection in high performance computing systems. Eng Appl Artif Intell 85 (2019):634–644

    Google Scholar 

  28. Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: International conference on artificial immune systems. Springer, pp 153–167

  29. Hariri S, Kind MC, Brunner RJ (2019) Extended isolation forest. IEEE Trans Knowl Data Eng 33(4):1479–1489

    Article  Google Scholar 

  30. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961

    Article  Google Scholar 

  31. Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z (2021) A bidirectional lstm deep learning approach for intrusion detection. Expert Syst Appl 185:115524

    Article  Google Scholar 

  32. Dagdia ZC, Avdeyev P, Bayzid M et al (2021) Biological computation and computational biology: survey, challenges, and discussion. Artif Intell Rev 54(6):4169–4235

    Article  Google Scholar 

  33. Gupta KD, Dasgupta D (2021) Negative selection algorithm research and applications in the last decade: a review. IEEE Trans Artif Intell 3(2):110–128

    Article  Google Scholar 

  34. Li Z, Li T, He J, Zhu Y, Wang Y (2021) A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm. Knowl-Based Syst 232:107477

    Article  Google Scholar 

  35. He J, Chen W, Li T, Li B, Zhu Y, Huang M (2021) Hd-nsa: a real-valued negative selection algorithm based on hierarchy division. Appl Soft Comput 112:107726

    Article  Google Scholar 

  36. Farzadnia E, Shirazi H, Nowroozi A (2021) A new intrusion detection system using the improved dendritic cell algorithm. Comput J 64(8):1193–1214

    Article  MathSciNet  Google Scholar 

  37. Bryan O, Corey C, Tony R, Franck B, Knox Susan J (2020) Just eat it-a review of cd47 and sirp antagonism. Semin Oncol 47(2):117–124

    Google Scholar 

  38. Mills K (2011) Tlr-dependent t cell activation in autoimmunity. Nat Rev Immunol 11(12):807–822

    Article  Google Scholar 

  39. Zhao Y, Nasrullah Z, Li Z (2019) Pyod-a python toolbox for scalable outlier detection. J Mach Learn Res 20(96):1–7

    Google Scholar 

  40. Pan S, Morris T, Adhikari U (2015) Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans Smart Grid 6(6):3104–3113

    Article  Google Scholar 

  41. Bacha S, Aljuhani A, Abdellafou KB, Taouali O, Liouane N, Alazab M (2022) Anomaly-based intrusion detection system in iot using kernel extreme learning machine. J Ambient Intell Humanized Comput:1–12

Download references

Acknowledgements

The authors wish to thank NSFC- http://www.nsfc.gov.cn/ for their support through Grant Number 61877045 and 62202147, Fundamental Research Project of Shenzhen Science and Technology Program for their support through Grant Number JCYJ20160428153956266, and Scientific Research Project of Hubei Provincial Department of Education for their support through Grant Number D20191406.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhe Ming.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ming, Z., Liang, Y. & Zhou, W. NDAMM: a numerical differentiation-based artificial macrophage model for anomaly detection. Appl Intell 53, 16151–16169 (2023). https://doi.org/10.1007/s10489-022-04334-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-022-04334-1

Keywords

Navigation