GF-NSA: A Negative Selection Algorithm Based on Self Grid File

Article Preview

Abstract:

The efficiency of traditional negative selection algorithm is too low to be applied. In our algorithm before the detector creation process, the structure of self data set is pre-treated to be a grid file, and the negative selection process is transformed into a data query procedure in the self grid file to improve the negative selection efficiency. Furthermore, each detector recorded its grid id to dynamically update itself along with the variations of self data in the grid.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3200-3203

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Thomas Stibor, Philipp Mohr, Jonathan Timmis. Is negative selection appropriate for anomaly detection? In Proceedings Genetic and Evolutionary Computation Conference(GECCO) , DC, USA, (2005).

DOI: 10.1145/1068009.1068061

Google Scholar

[2] Edgar Chavez, Gonzalo Navarro. Measuring the dimensionality of general metric spaces. Technical Report TR/DCC-00-1, Department of Computer Science, University of Chile, (2000).

Google Scholar

[3] S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer, in Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, (1994), p.202–212.

DOI: 10.1109/risp.1994.296580

Google Scholar

[4] Gonzalez,F., D. Dasgupta, L.F. Nino, A randomized real-valued negative selection algorithm. in Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS). LNCS, Edinburgh, UK, Springer - Verlag, (2003), pp.261-272.

DOI: 10.1007/978-3-540-45192-1_25

Google Scholar

[5] Zhou Ji, D. Dasgupta. Real-valued negative selection algorithm with variable-sized detectors. In Proceedings Genetic and Evolutionary Computation Conference (GECCO), (2004), pp.287-298.

DOI: 10.1007/978-3-540-24854-5_30

Google Scholar

[6] Zhou Ji, D. Dasgupta. V-detector: An efficient negative selection algorithm with probably adequate, detector coverage. Information sciences, 2009, pp.1390-1406.

DOI: 10.1016/j.ins.2008.12.015

Google Scholar

[7] Li Tao immune based dynamic intrusion detectionmodel. China Sci Bull (2005), pp.2650-2657.

Google Scholar

[8] J Nievergelt. The Grid File: An Adaptable, Symmetric Multikey File Structure. ACM Transactions on Database Systems (TODS) archive Vol. 9 (1984), pp.38-71.

DOI: 10.1145/348.318586

Google Scholar

[9] Stand UCI dataset Abalone Data Set, http: /archive. ics. uci. edu/ml/datasets. html.

Google Scholar