Revisiting Negative Selection Algorithms

This paper reviews the progress of negative selection algorithms, an anomaly/change detection approach in Artificial Immune Systems (AIS). Following its initial model, we try to identify the fundamental characteristics of this family of algorithms and summarize their diversities. There exist various elements in this method, including data representation, coverage estimate, affinity measure, and matching rules, which are discussed for different variations. The various negative selection algorithms are categorized by different criteria as well. The relationship and possible combinations with other AIS or other machine learning methods are discussed. Prospective development and applicability of negative selection algorithms and their influence on related areas are then speculated based on the discussion.

[1]  Fabio A. González,et al.  A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.

[2]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[3]  Wenjian Luo,et al.  A Heuristic Detector Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rule , 2006, ICARIS.

[4]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[5]  Slawomir T. Wierzchon,et al.  Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .

[6]  David E. Goldberg,et al.  FOX-GA: A Genetic Algorithm for Generating and Analyzing Battlefield Courses of Action , 1999, Evolutionary Computation.

[7]  Patrik D'haeseleer,et al.  An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[8]  Zhou Ji,et al.  Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[9]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[10]  Dipankar Dasgupta,et al.  An Immunogenetic Approach to Spectra Recognition , 1999, GECCO.

[11]  Honghua Dai,et al.  Constructing Detectors in Schema Complementary Space for Anomaly Detection , 2004, GECCO.

[12]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[13]  Rui Vilela Mendes,et al.  Using immunology principles for fault detection , 2003, IEEE Trans. Ind. Electron..

[14]  Paul Helman,et al.  The Crossover Closure and Partial Match Detection , 2003, ICARIS.

[15]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[16]  Zhou Ji,et al.  Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.

[17]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[18]  Peter J. Bentley,et al.  Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .

[19]  H. Dai,et al.  Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.

[20]  大樹 若山 SCIS & ISIS 2004 (Joint 2nd International Conference on Soft Computing and Intelligent Systems and 5th International Symposium on Advanced Intelligent Systems)報告 , 2004 .

[21]  Alex Alves Freitas,et al.  Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.

[22]  Marc Ebner,et al.  On The Use Of Negative Selection In An Artificial Immune System , 2002, GECCO.

[23]  Paul Helman,et al.  On-line Negative Databases , 2004, Int. J. Unconv. Comput..

[24]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[25]  David W. Corne,et al.  An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.

[26]  Costas Tsatsoulis,et al.  Determining Object Safety Using a Multiagent, Collaborative System , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.

[27]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[28]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[29]  Senhua Yu,et al.  MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.

[30]  Gilbert L. Peterson,et al.  An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection , 2005, GECCO '05.

[31]  Zhou Ji,et al.  Estimating the detector coverage in a negative selection algorithm , 2005, GECCO '05.

[32]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[33]  Dipankar Dasgupta,et al.  An Overview of Artificial Immune Systems and Their Applications , 1993 .

[34]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[35]  Xiang Zhang,et al.  Vector computer 757 , 1986, Journal of Computer Science and Technology.

[36]  Dipankar Dasgupta,et al.  An Anomaly Entection Algorithm Inspired by the Immune Syste , 1999 .

[37]  Fabio A. González,et al.  Discriminating and visualizing anomalies using negative selection and self-organizing maps , 2005, GECCO '05.

[38]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[39]  Claudia Eckert,et al.  The Link between r-contiguous Detectors and k-CNF Satisfiability , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[40]  Richard Wheeler,et al.  The Effect of Antibody Morphology on Non-self Detection , 2003, ICARIS.

[41]  Xiao Zhi Gao,et al.  Re-editing and Censoring of Detectors in Negative Selection Algorithm , 2009, Int. J. Comput. Intell. Syst..

[42]  Claudia Eckert,et al.  On Permutation Masks in Hamming Negative Selection , 2006, ICARIS.

[43]  P. Helman,et al.  A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[44]  Fabio A. González,et al.  The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.

[45]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[46]  Young-Il Kim,et al.  Complementary Dual Detectors for Effective Classification , 2003, ICARIS.

[47]  Fernando Niño,et al.  A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[48]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[49]  Lois Boggess,et al.  Non-Euclidean distance measures in AIRS, an artificial immune classification system , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[50]  Peter Ross,et al.  Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.

[51]  Simon M. Garrett,et al.  How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.

[52]  A. Perelson,et al.  Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. , 1993, Proceedings of the National Academy of Sciences of the United States of America.

[53]  Emma Hart,et al.  Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.

[54]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[55]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.