BIORV-NSA: Bidirectional inhibition optimization r-variable negative selection algorithm and its application

A bidirectional inhibition optimization r-variable negative selection algorithm (BIORV-NSA) is proposed to generate less mature detectors and cover more "black holes".BIORV-NSA algorithm is composed of two sub algorithms that are self set edge inhibition strategy and detector self-inhibition strategy.When doing comparative experiments, BIORV-NSA is divided into two kinds of algorithms, which are a bidirectional weak inhibition optimization r-variable negative selection algorithm and a bidirectional strong inhibition optimization r-variable negative selection algorithm, respectively. The original negative selection algorithm (NSA) has the disadvantages that many "black holes" cannot be detected and excessive invalid detectors are generated. To overcome its defects, this paper improves the detection performance of NSA and presents a kind of bidirectional inhibition optimization r-variable negative selection algorithm (BIORV-NSA). The proposed algorithm includes self set edge inhibition strategy and detector self-inhibition strategy. Self set edge inhibition strategy defines a generalized radius for self individual area, making self individual radius dynamically be variable. To a certain extent, the critical antigens close to self individual area are recognized and more non-self space is covered. Detector self-inhibition strategy, aiming at mutual cross-coverage among mature detectors, eliminates those detectors that are recognized by other mature detectors and avoids the production of excessive invalid detectors. Experiments on artificially generating data set and two standard real-world data sets from UCI are made to verify the performance of BIORV-NSA, by comparison with NSA and R-NSA, the experimental results demonstrate that the proposed BIORV-NSA algorithm can cover more non-self space, greatly improve the detection rates and obtain better detection performance by using fewer mature detectors.

[1]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Wei Zhang,et al.  A Survey of artificial immune applications , 2010, Artificial Intelligence Review.

[3]  Manuel Eduardo Correia,et al.  Self Tolerance by Tuning T-Cell Activation: An Artificial Immune System for Anomaly Detection , 2010, BIONETICS.

[4]  Jie Zhang,et al.  EvoSeedRNSAII: An improved evolutionary algorithm for generating detectors in the real-valued Negative Selection Algorithms , 2014, Appl. Soft Comput..

[5]  Jonathan Timmis,et al.  Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..

[6]  Li Tao An Immune Based Model for Network Monitoring , 2006 .

[7]  Kamalrulnizam Abu Bakar,et al.  Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.

[8]  Fabio A. González,et al.  A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.

[9]  Zhang Li Clonal Selection Algorithm Based on Anti-Idiotype , 2009 .

[10]  Jonathan Timmis,et al.  Theory and applications of artificial immune systems , 2010, Neural Computing and Applications.

[11]  Henry Y. K. Lau,et al.  Advancement in the twentieth century in artificial immune systems for optimization: Review and future outlook , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[12]  Rupesh K. Gopal,et al.  A Rule-based Approach for Anomaly Detection in Subscriber Usage Pattern , 2007 .

[13]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[14]  Jonathan Timmis,et al.  Artificial immune systems - a new computational intelligence paradigm , 2002 .

[15]  Yoshiteru Ishida,et al.  The immune system as a prototype of autonomous decentralized systems: an overview , 1997, Proceedings of the Third International Symposium on Autonomous Decentralized Systems. ISADS 97.

[16]  Ahmad Akbari,et al.  A Real Time Anomaly Detection System Based on Probabilistic Artificial Immune Based Algorithm , 2012, ICARIS.

[17]  Zhang Yu,et al.  An Algorithm of r-Adjustable Negative Selection Algorithm and Its Simulation Analysis , 2005 .

[18]  Andries Petrus Engelbrecht,et al.  Application of the feature-detection rule to the Negative Selection Algorithm , 2013, Expert Syst. Appl..

[19]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[20]  Li Tao,et al.  Negative selection algorithm based on grid file of the feature space , 2014 .

[21]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .