Negative selection algorithm with constant detectors for anomaly detection

FB-NSA and FFB-NSA generate a layer of detectors, which are around the self space.The detectors generated by FB-NSA and FFB-NSA in nonrandom ways.The detectors of FB-NSA and FFB-NSA are only related to the training samples.FB-NSA can detect the abnormal degree of mechanical equipment. In the paper, two novel negative selection algorithms (NSAs) were proposed: FB-NSA and FFB-NSA. FB-NSA has two types of detectors: constant-sized detector (CFB-NSA) and variable-sized detector (VFB-NSA). The detectors of traditional NSA are generated randomly. Even for the same training samples, the position, size, and quantity of the detectors generated in each time are different. In order to eliminate the effect of training times on detectors, in the proposed approaches, detectors are generated in non-random ways. To determine the performances of the approaches, the experiments on 2-dimensional synthetic datasets, Iris dataset and ball bearing fault data were performed. Results show that FB-NSA and FFB-NSA outperforms the other anomaly detection methods in most cases. Besides, CFB-NSA can detect the abnormal degree of mechanical equipment. To determine the performances of CFB-NSA, the experiments on ball bearing fault data were performed. Results show that the abnormal degree based on the CFB-NSA can be used to diagnose the different fault types with the same fault degree, and the same fault type with the different fault degree.

[1]  Ming Chen,et al.  Adaptive BER-constraint-based power allocation for downlink MC-CDMA systems with linear MMSE receiver , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[2]  Gilbert L. Peterson,et al.  An Evolutionary Algorithm to Generate Ellipsoid Detectors for Negative Selection , 2012 .

[3]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[4]  Li Tao,et al.  Negative selection algorithm based on grid file of the feature space , 2014 .

[5]  Fernando Niño,et al.  A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[6]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  Tao Li,et al.  A negative selection algorithm based on hierarchical clustering of self set , 2011, Science China Information Sciences.

[8]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[9]  Li-Fei Chen An improved negative selection approach for anomaly detection: with applications in medical diagnosis and quality inspection , 2011, Neural Computing and Applications.

[10]  Gilbert L. Peterson,et al.  An evolutionary algorithm to generate ellipsoid network intrusion detectors , 2005, GECCO '05.

[11]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[12]  Guilherme Costa Silva,et al.  Immune inspired Fault Detection and Diagnosis: A fuzzy-based approach of the negative selection algorithm and participatory clustering , 2012, Expert Syst. Appl..

[13]  Maoguo Gong,et al.  An efficient negative selection algorithm with further training for anomaly detection , 2012, Knowl. Based Syst..

[14]  Francisco Viveros Jiménez,et al.  An adaptive single-point algorithm for global numerical optimization , 2014, Expert Syst. Appl..

[15]  Dipankar Dasgupta,et al.  Artificial Immune Systems in Intrusion Detection , 2005 .

[16]  Zhou Ji,et al.  V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..

[17]  Andries Petrus Engelbrecht,et al.  Application of the feature-detection rule to the Negative Selection Algorithm , 2013, Expert Syst. Appl..

[18]  Dipankar Dasgupta,et al.  An evolutionary approach to generate fuzzy anomaly (attack) signatures , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[19]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[20]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[21]  Li Tao,et al.  A self-adaptive negative selection algorithm used for anomaly detection , 2009 .

[22]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[23]  Bo Wang,et al.  The machine abnormal degree detection method based on SVDD and negative selection mechanism , 2013 .

[24]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[25]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[26]  Fabio A. González,et al.  An Imunogenetic Technique To Detect Anomalies In Network Traffic , 2002, GECCO.

[27]  Dong Li,et al.  A negative selection algorithm with online adaptive learning under small samples for anomaly detection , 2015, Neurocomputing.