A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set

Article Preview

Abstract:

In this article, we proposed a negative selection algorithm which based on hierarchical level cluster of self dataset CB-RNSA. First the self data set is clustered by different cluster radius, and then the self data are substituted by cluster centers to compare with candidate detectors to reduce the number of distance counting. In the detector creating process, the value of each detector property was restricted to a given value range so as to decrease the redundancy of detectors. The stimulation result shows that CB-RNSA is an effective algorithm for the creation of artificial immune detectors.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 121-122)

Pages:

486-489

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Edgar Chavez, Gonzalo Navarro. Measuring the dimensionality of general metric spaces. Technical Report TR/DCC-00-1, University of Chile(2000) Submitted.

Google Scholar

[2] Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, Self-nonself discrimination in a computer, in Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, pp.202-212 (1994).

DOI: 10.1109/risp.1994.296580

Google Scholar

[3] Hofmeyr S. A., Forrest S., D'haeseleer P.: An immunological approach to distributed network intrusion detection. In: First International Workshop on theRecent Advances in Intrusion Detection(1998).

Google Scholar

[4] J.E. Hunt, Dense E. Cooke. Learning using an artificial immune system, in Journal of Network and Computer Applications, Vol. 19, pp.189-212(1996).

DOI: 10.1006/jnca.1996.0014

Google Scholar

[5] D. Dasgupta, L.F. Nino, A randomized real-valued negative selection algorithm. in Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS). LNCS, Edinburgh, UK, Springer-Verlag (2003) 261-272.

DOI: 10.1007/978-3-540-45192-1_25

Google Scholar

[6] Zhou Ji, D. Dasgupta. Real-valued negative selection algorithm with variable-sized detectors. in Proceedings Genetic and Evolutionary Computation Conference(GECCO), pp.287-298 June , (2004).

DOI: 10.1007/978-3-540-24854-5_30

Google Scholar

[7] Thomas Stibor, Philipp Mohr, Jonathan Timmis. Is negative selection appropriate for anomaly detection? in Proceedings Genetic and Evolutionary Computation Conference(GECCO), DC, USA(2005).

DOI: 10.1145/1068009.1068061

Google Scholar

[8] Jungwon Kim, Peter J. Bentley. An evaluation of negative selection in an artificial immune system for network intrusion detection, in Proceedings Genetic and Evolutionary Computation Conference(GECCO) (2001).

DOI: 10.1109/cec.2001.934333

Google Scholar

[9] Li T Computer immunology. Publishing House ofElectronics Industry, Beijing(2004).

Google Scholar

[10] http: /archive. ics. uci. edu/ml/datasets/Blood+Transfusion+Service+Center Stand UCI dataset.

Google Scholar