Negative selection algorithms: from the thymus to v-detector

Artificial Immune Systems (AIS) is a research area of developing computational methods inspired by biological immune systems. The approach of negative selection algorithms (NSA) is one of the major models of AIS. This dissertation does a comprehensive survey of NSA and highlights the key components that define a negative selection algorithm. It demonstrates that the so-called 'negative selection algorithms' have been a very broad interpretation compared with its biological archetype and differ from one another in strategy, applicability and implementation. This work proposed a new negative selection algorithm called V-detector. It has several important features that alleviate some difficulties in negative selection algorithms. (1) Statistical techniques are integrated in the detector generation process to estimate the detector coverage. (2) Detectors with variable coverage are used in a highly efficient manner to achieve maximum coverage. (3) A boundary-aware algorithm is proposed to interpret the training data set as a whole, instead of considering them as independent points. It shows that negative selection's certain learning property cannot be replaced by straightforward positive selection. (4) The main components of V-detector can be customized for different data/detector representations and detector generation mechanisms. This generic characteristic could connect the gap between different negative selection algorithms. For example, extension from Euclidean distance to more general distance measures demonstrated its potential to accommodate domain specific elements. (5) One-shot training instead of evolutionary approach is utilized to lead to a more concise model. While it doesn't exclude combination or cooperation with evolutionary process, this simple model makes it possible to implement a very efficient learning process and provides great flexibility for extension. In the light of recent years' doubts about negative selection algorithms, applicability of negative selection algorithms is discussed in details both to understand the reasonable scenarios to use it and its intrinsic limitations. Negative selection algorithms, mainly MILA (Multilevel Immune Learning Algorithm) and V-detector, were experimented on various real-world datasets. To demonstrate its strength, V-detector was used in image-based dental diagnosis with a novel real-valued representation of occlusion condition on dental images.

[1]  Antonio Fernández,et al.  One-class texture classifier in the CCR feature space , 2003, Pattern Recognit. Lett..

[2]  Eamonn J. Keogh,et al.  Finding surprising patterns in a time series database in linear time and space , 2002, KDD.

[3]  Fabio A. González,et al.  A comparative analysis of artificial immune network models , 2005, GECCO '05.

[4]  Peter Ross,et al.  Exploiting the analogy between immunology and sparse distributedmemories : a system for lustering non-stationary data , 2002 .

[5]  Jon Timmis,et al.  Artificial Immune Recognition System (AIRS): Revisions and Refinements , 2002 .

[6]  R S Nanda,et al.  Analysis of factors affecting angle ANB. , 1984, American journal of orthodontics.

[7]  Fabio A. González,et al.  An Novel Artificial Immune System Approach to Robust Data Mining , 2002, GECCO Late Breaking Papers.

[8]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[9]  Mark James Neal,et al.  Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.

[10]  Zhou Ji,et al.  Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.

[11]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[12]  John E. Hunt,et al.  An adaptive, distributed learning system based on the immune system , 1995, 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century.

[13]  Kevin P. Anchor,et al.  CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.

[14]  L.N. de Castro,et al.  An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[15]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[16]  Zhou Ji,et al.  Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[17]  Lois Boggess,et al.  Non-Euclidean distance measures in AIRS, an artificial immune classification system , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[18]  Dipankar Dasgupta,et al.  An immunochip architecture and its emulation , 2002, Proceedings 2002 NASA/DoD Conference on Evolvable Hardware.

[19]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[20]  Jonathan Timmis,et al.  AINE: an immunological approach to data mining , 2001, Proceedings 2001 IEEE International Conference on Data Mining.

[21]  Zhou Ji,et al.  Estimating the detector coverage in a negative selection algorithm , 2005, GECCO '05.

[22]  N K Jerne,et al.  Towards a network theory of the immune system. , 1973, Annales d'immunologie.

[23]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[24]  Dipankar Dasgupta An Overview of Artificial Immune Systems and Their Applications , 1993 .

[25]  Carlos A. Coello Coello,et al.  A parallel implementation of an artificial immune system to handle constraints in genetic algorithms: preliminary results , 2002, IEEE Congress on Evolutionary Computation.

[26]  Peter J. Bentley,et al.  Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .

[27]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[28]  David W. Corne,et al.  An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.

[29]  Richard Wheeler,et al.  The Effect of Antibody Morphology on Non-self Detection , 2003, ICARIS.

[30]  Jon Timmis,et al.  A Multi-Layered Immune Inspired Approach to Data Mining , 2003 .

[31]  J. Neidhoefer,et al.  Immunized Adaptive Critic for an Autonomous Aircraft Control Application , 1999 .

[32]  Leandro Nunes de Castro,et al.  An Immunological Approach to Initialize Feedforward Neural Network Weights , 2001 .

[33]  Shi Wengang,et al.  Negative-selection algorithm based approach for fault diagnosis of rotary machinery , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).

[34]  B. Everitt,et al.  Statistical methods for rates and proportions , 1973 .

[35]  P. Hajela,et al.  Immune network simulations in multicriterion design , 1999 .

[36]  Peter Ross,et al.  Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.

[37]  Simon M. Garrett,et al.  How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.

[38]  Jongsoo Lee,et al.  Constrained genetic search via schema adaptation: An immune network solution , 1996 .

[39]  Jonathan Timmis Artificial immune systems : a novel data analysis technique inspired by the immune network theory , 2000 .

[40]  Alex Alves Freitas,et al.  Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.

[41]  Marc Ebner,et al.  On The Use Of Negative Selection In An Artificial Immune System , 2002, GECCO.

[42]  Paul Helman,et al.  On-line Negative Databases , 2004, Int. J. Unconv. Comput..

[43]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[44]  Dipankar Dasgupta Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[45]  Dipankar Dasgupta,et al.  The Promise and Challenges of Artificial Immune System Based Web Usage Mining : Preliminary Results , 2002 .

[46]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[47]  John E. Hunt,et al.  Learning using an artificial immune system , 1996 .

[48]  Jonathan Timmis,et al.  Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.

[49]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[50]  Patrik D'haeseleer,et al.  An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[51]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[52]  Young-Il Kim,et al.  Complementary Dual Detectors for Effective Classification , 2003, ICARIS.

[53]  Andrew M. Tyrrell,et al.  Immunotronics: Hardware Fault Tolerance Inspired by the Immune System , 2000, ICES.

[54]  Zhou Ji,et al.  A BOUNDARY-AWARE NEGATIVE SELECTION ALGORITHM , 2005 .

[55]  Felipe Cucker,et al.  On the mathematical foundations of learning , 2001 .

[56]  Dipankar Dasgupta,et al.  A study of artificial immune systems applied to anomaly detection , 2003 .

[57]  Fabio A. González,et al.  A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning , 2003, GECCO.

[58]  Emma Hart,et al.  Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.

[59]  Susan Stepney,et al.  Towards a Conceptual Framework for Artificial Immune Systems , 2004, ICARIS.

[60]  A. B. Watkins,et al.  A resource limited artificial immune classifier , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[61]  Robert Kozma,et al.  Dynamical neuro-representation of an immune model and its application for data classification , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[62]  Jonathan Timmis,et al.  Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..

[63]  J Timmis,et al.  An artificial immune system for data analysis. , 2000, Bio Systems.

[64]  Paul Helman,et al.  The Crossover Closure and Partial Match Detection , 2003, ICARIS.

[65]  David M. J. Tax,et al.  One-class classification , 2001 .

[66]  P. Helman,et al.  A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[67]  Fabio A. González,et al.  The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.

[68]  Mohd Aizaini Maarof,et al.  Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons , 2004, ICARIS.

[69]  Fabio A. González,et al.  Discriminating and visualizing anomalies using negative selection and self-organizing maps , 2005, GECCO '05.

[70]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[71]  Dipankar Dasgupta,et al.  A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[72]  Mark Neal,et al.  An artificial immune system for continuous analysis of time-varying data , 2002 .

[73]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[74]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.

[75]  Zhou Ji,et al.  Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[76]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[77]  Dipankar Dasgupta,et al.  An Immunogenetic Approach to Spectra Recognition , 1999, GECCO.

[78]  F. Varela,et al.  Evidence for a functional idiotypic network among natural antibodies in normal mice. , 1989, Proceedings of the National Academy of Sciences of the United States of America.

[79]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: Part I-Basic Theory and Applications , 1999 .

[80]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[81]  Agostinho C. Rosa,et al.  Immune System Simulation through a Complex Adaptive System Model , 2002 .

[82]  Stephanie Forrest,et al.  Information Immune Systems , 2003, Genetic Programming and Evolvable Machines.

[83]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[84]  Dipankar Dasgupta,et al.  An immunogenetic approach in chemical spectrum recognition , 2003 .

[85]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[86]  D. Dasgupta,et al.  A formal model of an artificial immune system. , 2000, Bio Systems.

[87]  Weber Je,et al.  Statistical analysis: Applications to business and economics , 1980 .

[88]  Honghua Dai,et al.  Constructing Detectors in Schema Complementary Space for Anomaly Detection , 2004, GECCO.

[89]  Fabio A. González,et al.  An Imunogenetic Technique To Detect Anomalies In Network Traffic , 2002, GECCO.

[90]  Sankar K. Pal,et al.  Fuzzy sets and decisionmaking approaches in vowel and speaker recognition , 1977 .

[91]  Senhua Yu,et al.  MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.

[92]  Gilbert L. Peterson,et al.  An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection , 2005, GECCO '05.

[93]  J. R. Quinlan,et al.  Data Mining Tools See5 and C5.0 , 2004 .

[94]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[95]  Slawomir T. Wierzchon,et al.  Deriving a concise description of non-self patterns in an artificial immune system , 2002 .

[96]  H. Dai,et al.  Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.

[97]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[98]  Eamonn J. Keogh,et al.  HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[99]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[100]  S T Lhu,et al.  Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .

[101]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[102]  H. Abbass,et al.  aiNet : An Artificial Immune Network for Data Analysis , 2022 .

[103]  Surya P. N. Singh,et al.  Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.

[104]  Jonathan Timmis,et al.  A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..

[105]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).