Parameter analysis of negative selection algorithm

Abstract The performance of negative selection algorithm (NSA) is affected by several parameters such as its self radius and expected coverage. Traditionally, most of the parameters are selected based on experience, resulting in varying performances of NSAs. In the present study, the NSA parameters were analyzed based on a new set of evaluation criteria. The criteria were used to calculate the self radius by an iterative algorithm using some nonself samples as reference points for the nonself boundary. The difficult problem of estimating the overlap volume between immune hyperspheres was solved by the Monte Carlo method. It was found that the error of the estimated nonself coverage was the primary cause of the poor performance of some existing artificial immune systems. A confidence estimation method was thus developed for improving the estimation precision. Experiments were performed in which both fixed- and variable-radius detectors were generated using different parameter value combinations. The results revealed that a significantly higher NSA performance could be achieved by the proposed parameter calculation method. Statistical analysis of the experimental results further confirmed the effectiveness and practicability of the proposed method.

[1]  Maoguo Gong,et al.  An efficient negative selection algorithm with further training for anomaly detection , 2012, Knowl. Based Syst..

[2]  Tao Li,et al.  Negative selection algorithm based on grid file of the feature space , 2014, Knowledge-Based Systems.

[3]  Wen Chen,et al.  A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set , 2010 .

[4]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[5]  Claudia Eckert,et al.  On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions , 2006, ICARIS.

[6]  Li Tao,et al.  A self-adaptive negative selection algorithm used for anomaly detection , 2009 .

[7]  Dong Li,et al.  A boundary-fixed negative selection algorithm with online adaptive learning under small samples for anomaly detection , 2016, Eng. Appl. Artif. Intell..

[8]  Zhou Ji,et al.  V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..

[9]  Mehmet Karaköse,et al.  Chaotic-based hybrid negative selection algorithm and its applications in fault and anomaly detection , 2010, Expert Syst. Appl..

[10]  Wanli Ma,et al.  Negative Selection with Antigen Feedback in Intrusion Detection , 2008, ICARIS.

[11]  Andries Petrus Engelbrecht,et al.  Application of the feature-detection rule to the Negative Selection Algorithm , 2013, Expert Syst. Appl..

[12]  Carlos A. Coello Coello,et al.  An immune algorithm with power redistribution for solving economic dispatch problems , 2015, Inf. Sci..

[13]  Salim Chikhi,et al.  A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System , 2014, Int. J. Inf. Secur. Priv..

[14]  Li Tao,et al.  Negative selection algorithm based on grid file of the feature space , 2014 .

[15]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[16]  Ali Selamat,et al.  Hybrid email spam detection model with negative selection algorithm and differential evolution , 2014, Eng. Appl. Artif. Intell..

[17]  Raed Abu Zitar,et al.  Genetic optimized artificial immune system in spam detection: a review and a model , 2011, Artificial Intelligence Review.

[18]  Matthew Skala,et al.  Measuring the Difficulty of Distance-Based Indexing , 2005, SPIRE.

[19]  Pascal Bouvry,et al.  Immune anomaly detection enhanced with evolutionary paradigms , 2006, GECCO.

[20]  Pascal Bouvry,et al.  Coevolutionary-based Mechanisms for Network Anomaly Detection , 2007, J. Math. Model. Algorithms.

[21]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  Liangpei Zhang,et al.  Sub-pixel mapping based on artificial immune systems for remote sensing imagery , 2013, Pattern Recognit..

[23]  Gilbert L. Peterson,et al.  An Evolutionary Algorithm to Generate Ellipsoid Detectors for Negative Selection , 2012 .

[24]  Fabio A. González,et al.  A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.

[25]  Michael Elberfeld,et al.  Negative selection algorithms on strings with efficient training and linear-time classification , 2011, Theor. Comput. Sci..

[26]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[27]  Tao Li,et al.  A negative selection algorithm based on hierarchical clustering of self set , 2010, Science China Information Sciences.

[28]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[29]  Gilbert L. Peterson,et al.  An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection , 2005, GECCO '05.

[30]  Jonathan Timmis,et al.  Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..

[31]  G. Weisbuch,et al.  Immunology for physicists , 1997 .

[32]  Jianbin Hu,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius , 2012, ICICA.

[33]  Dechang Pi,et al.  BIORV-NSA: Bidirectional inhibition optimization r-variable negative selection algorithm and its application , 2015, Appl. Soft Comput..

[34]  Ngoc Thanh Nguyen,et al.  A combined negative selection algorithm-particle swarm optimization for an email spam detection system , 2015, Eng. Appl. Artif. Intell..

[35]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..