A Negative Selection Algorithm with the Variable Length Detector

The detector generation is the key step of negative selection. Current detector generation algorithms have holes area and redundancy detector problems. A negative selection algorithm with the variable length detector is proposed in this paper. This algorithm can not only remove the holes, but also decrease redundancy detectors by the corresponding detector optimization algorithm. Therefore, both the detector generation efficiency and the detecting efficiency are improved well. This algorithm is analyzed in this paper and verified by experiments. The experimental results prove that this algorithm is better than the traditional negative selection algorithms and the negative selection algorithm with the r-adjustable detector.

[1]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Dipankar Dasgupta,et al.  Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[4]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[5]  Zhang Yu,et al.  An Algorithm of r-Adjustable Negative Selection Algorithm and Its Simulation Analysis , 2005 .

[6]  Jonathan Timmis,et al.  A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..

[7]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[8]  Long-Tao He A Time Optimal Exact String Matching Algorithm , 2005 .

[9]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[10]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[11]  F. von Zuben,et al.  An evolutionary immune network for data clustering , 2000, Proceedings. Vol.1. Sixth Brazilian Symposium on Neural Networks.

[12]  F. Azuaje Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .