DENSA: An effective negative selection algorithm with flexible boundaries for self-space and dynamic number of detectors

Abstract The negative selection algorithm is an anomaly detection technique inspired by the self-nonself discrimination behavior observed in the Biological Immune System. The most controversial question of these algorithms is their poor performance on real world applications. To overcome such limitation this research work focuses on generating more efficient detectors through a more flexible boundary for self-patterns. Rather than applying conventional affinity measures, the detectors are generated benefiting from a Gaussian Mixture Model (GMM) fitted on normal space. From the GMM capabilities the algorithm is able to dynamically determine efficient subsets of detectors. In order to evaluate the efficiency and robustness of the proposed algorithm, different data sets have been examined as benchmark, including 2D synthesis data sets. Furthermore, for evaluating the capability and effectiveness of the proposed algorithm on real-world problems, it has been performed and tested for detecting anomalies in archaeological sites located in Lorestan, Iran. The experimental results prove how the proposed approach helps the negative selection algorithm to improve its detection capability, because the detectors can be efficiently distributed into the non-self space. It is important to note how this research work presents also a first analysis of the anomaly detection capabilities in the field of archaeology, introducing a novel application method, which can be efficiently used by the archaeologists for interpreting their growing amount of data and draw valuable conclusions about the historical past. Finally, in order to analyse the convergence and the running time of the proposed algorithm, a study has been conducted using the classical Time-To-Target plots, which present a standard graphical methodology for data analysis based on the comparisons between the empirical and theoretical distributions.

[1]  Adrian E. Raftery,et al.  How Many Clusters? Which Clustering Method? Answers Via Model-Based Cluster Analysis , 1998, Comput. J..

[2]  Jianbin Hu,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius , 2012, ICICA.

[3]  Wenjian Luo,et al.  A Heuristic Detector Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rule , 2006, ICARIS.

[4]  Zhou Ji,et al.  Negative selection algorithms: from the thymus to v-detector , 2006 .

[5]  Vincenzo Cutello,et al.  An immune algorithm with stochastic aging and kullback entropy for the chromatic number problem , 2007, J. Comb. Optim..

[6]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[7]  Vanda Vitali Formal methods for the analysis of archaeological data: data analysis vs expert systems , 2009 .

[8]  Slawomir T. Wierzchon,et al.  Hybrid Negative Selection Approach for Anomaly Detection , 2012, CISIM.

[9]  Vincenzo Cutello,et al.  On discrete models and immunological algorithms for protein structure prediction , 2011, Natural Computing.

[10]  Alireza Osareh,et al.  Automated identification of diabetic retinal exudates and the optic disc , 2004 .

[11]  Josep Puyol-Gruart Computer Science , Artificial Intelligence and Archaeology , 2002 .

[12]  Vincenzo Cutello,et al.  An Immune Algorithm for Protein Structure Prediction on Lattice Models , 2007, IEEE Transactions on Evolutionary Computation.

[13]  Slawomir T. Wierzchon,et al.  Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System , 2000, Intelligent Information Systems.

[14]  Wenjian Luo,et al.  PTS-RNSA: A Novel Detector Generation Algorithm for Real-Valued Negative Selection Algorithm , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.

[15]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[16]  Richard E. Neapolitan,et al.  Artificial Intelligence: With an Introduction to Machine Learning, Second Edition , 2018 .

[17]  Julian D. Richards,et al.  Recent Trends in Computer Applications in Archaeology , 1998 .

[18]  Julian D. Richards New tools from mathematical archaeology , 1992 .

[19]  Honghua Dai,et al.  Constructing Detectors in Schema Complementary Space for Anomaly Detection , 2004, GECCO.

[20]  Celso C. Ribeiro,et al.  TTT plots: a perl program to create time-to-target plots , 2007, Optim. Lett..

[21]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[22]  Jon Timmis,et al.  An immune network inspired evolutionary algorithm for the diagnosis of Parkinson's disease , 2008, Biosyst..

[23]  Andries Petrus Engelbrecht,et al.  Application of the feature-detection rule to the Negative Selection Algorithm , 2013, Expert Syst. Appl..

[24]  Mauricio G. C. Resende,et al.  A Greedy Randomized Adaptive Search Procedure for Maximum Independent Set , 1994, Oper. Res..

[25]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.

[26]  Celso C. Ribeiro,et al.  Probability Distribution of Solution Time in GRASP: An Experimental Investigation , 2002, J. Heuristics.

[27]  Alireza Osareh,et al.  Distribution estimation based negative selection algorithm (DENSA) , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).

[28]  M Pavone,et al.  An Immunological Algorithm for Combinatorial Optimization: the FuelDistribution Problem as Case Study , 2015 .

[29]  Fabio A. González,et al.  An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[30]  Wenjian Luo,et al.  On the self representation based on the adaptive self radius , 2011, The Fourth International Workshop on Advanced Computational Intelligence.

[31]  L. Deravignone,et al.  Artificial Neural Networks in archaeology , 2006 .

[32]  Giuseppe Nicosia,et al.  Clonal selection: an immunological algorithm for global optimization over continuous spaces , 2012, J. Glob. Optim..

[33]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[34]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[35]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[36]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[37]  Jie Zhang,et al.  EvoSeedRNSAII: An improved evolutionary algorithm for generating detectors in the real-valued Negative Selection Algorithms , 2014, Appl. Soft Comput..

[38]  Ian T. Nabney,et al.  Netlab: Algorithms for Pattern Recognition , 2002 .

[39]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[40]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[41]  Juan A. Barceló Computational Intelligence in Archaeology. A State-of-the Art. , 2009 .

[42]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[43]  Jian Pei,et al.  Data Mining: Concepts and Techniques, 3rd edition , 2006 .

[44]  Fabio A. González,et al.  A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.

[45]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[46]  Vincenzo Cutello,et al.  Protein multiple sequence alignment by hybrid bio-inspired algorithms , 2011, Nucleic acids research.

[47]  Vincenzo Cutello,et al.  Immune Algorithm Versus Differential Evolution: A Comparative Case Study Using High Dimensional Function Optimization , 2007, ICANNGA.

[48]  James Cannady,et al.  A self-adaptive negative selection approach for anomaly detection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).