吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (01): 176-181.

• paper • Previous Articles     Next Articles

Real-value negative selection algorithm for anomaly detection

CHAI Zheng-yi1,2, WANG Xian-rong1, WANG Liang3   

  1. 1. School of Information Science and Engineering, He'nan University of Technology, Zhengzhou 450001,China;
    2. School of Computer Science and Technology,Xidian University, Xi'an 710071,China;
    3. Department of Materials Management, Chengde Medical University, Chengde 067000,China
  • Received:2010-03-24 Online:2012-01-01 Published:2012-01-01

Abstract:

An optimized detector generation algorithm was proposed to solve the shortcomings of existing real-value negative selection algorithm. This algorithm fully utilizes self distribution, optimizes the center of the detector and expands the radius of the detector in order to generate a detector with large coverage. The expected coverage was used as one of the control parameters to end the algorithm so that it can effectively avoid the generation of redundant detector. Moreover, the anomaly detection system and it formal description were established. The error rate as a new index for anomaly detection performance was defined. The 2DSyntheticData and the actual Irish data set and biomedical data were used to test the algorithm. Experimental results show that, compared with V-detector, the algorithm improves detection rate, reduces the error rate and the required number of detectors. So it has a better detection performance.

Key words: artificial intelligence, anomaly detection, negative selection algorithm, detector, detection performance

CLC Number: 

  • TP18


[1] 朱思峰,刘芳,柴争义. 基于检测器覆盖率评估的否定选择算法
[J]. 华中科技大学学报:自然科学版,2009,37(12):1407-1410. Zhu Si-feng, Liu Fang,Chai Zheng-yi. A novel negative selection algorithm using detector's coverage evaluation
[J]. Journal of Huazhong University of Science and Technology(Nature Science Edition), 2009,37(12):1407-1410.

[2] Bereta M,Burczy'nski T. Comparing binary and real-valued coding in hybrid immune algorithm for feature selection and classification of ecg signals
[J]. Eng Appl Artif Intell, 2007,20(5):571-585.

[3] González F, Dasgupta D, Kozma R. Combining negative selection and classification techniques for anomaly detection//Proceedings of the 2002 Congress on Evolutionary Computation CEC2002.USA:IEEE Press,2002:705-710.

[4] González F A,Dasgupta D. Anomaly detection using real-valued negative selection
[J]. Journal of Genetic Programming and Evolvable Machines,2003,4(4):383-403.

[5] González F, Dasgupta D,Nio L F. A randomized rea-valued negative selection algorithm
[J]. Lecture Notes in Computer Science,2003,2787:261-272.

[6] Zhou Ji, Dasgupta D. Real-valued negative selection algorithm with variable-sized detectors//Proceedings of GECCO. Berlin: Springer, 2005: 287-298.

[7] Zhou Ji. A boundary-aware negative selection algorithm//IASTED International Conference on Artificial Intelligence and Soft Computing (ASC), Benidorm, Spain, 2006:45-50.

[8] Zhou Ji, Dasgupta D. V-Detector: an efficient negative selection algorithm with "probably adequate" detector coverage
[J]. Information Sciences,2009,17(9):1390-1406.

[9] Zhang Feng-bin, Wang Da-wei, Wang Sheng-wen. A self region based real-valued negative selection algorithm
[J]. Journal of Harbin Institute of Technology, 2008,15(6):851-855.

[10] Zeng Jin-quan, Liu Xiao-jie,Tao Li. A self-adaptive negative selection algorithm used for anomaly detection
[J]. Progress in Natural Science,2009,19(2),261-266.

[11] 柴争义,刘芳,朱思峰. 新型智能入侵防御模型
[J]. 华中科技大学学报:自然科学版,2010,38(1):22-24. Chai Zheng-yi., Liu Fang, Zhu Si-feng. Novel intelligent model for intrusion prevention
[J]. Journal of Huazhong University of Science and Technology(Nature Science Edition),2010,38(1):22-24.

[12] 刘衍珩,孙蕾,田大新,等. 基于融合主成分匹配的异常检测方法
[J]. 吉林大学学报:工学版,2009,39(5):1314-1320. Liu Yan-heng,Sun Lei,Tian Da-xin, et al. Method of anomaly detection based on fusion principal components match
[J]. Journal of Jilin University(Engineering and Science Edition):2009,39(5):1314-1320.

[13] 马鑫,梁艳春,田野,等. 基于免疫机理与合同网协议的多Agent入侵检测系统
[J]. 吉林大学学报:工学版,2011,41(1):176-181. Ma Xin,Liang Yan-chun,Tian Ye,et al. An immune and contact net protocol-based multi-agent lintrusion detection system
[J]. Journal of Jilin University(Engineering and Science Edition):2011,41(1):176-181.

[14] Columbia University. 2D Synthetic Data.. http://www. zhouji. net/prof/2DSyntheticData.zip.

[15] StatLib Datasets Archive. http://lib.stat.cmu.edu//dataset.

[1] DONG Sa, LIU Da-you, OUYANG Ruo-chuan, ZHU Yun-gang, LI Li-na. Logistic regression classification in networked data with heterophily based on second-order Markov assumption [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1571-1577.
[2] GU Hai-jun, TIAN Ya-qian, CUI Ying. Intelligent interactive agent for home service [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1578-1585.
[3] WANG Xu, OUYANG Ji-hong, CHEN Gui-fen. Measurement of graph similarity based on vertical dimension sequence dynamic time warping method [J]. 吉林大学学报(工学版), 2018, 48(4): 1199-1205.
[4] ZHANG Hao, ZHAN Meng-ping, GUO Liu-xiang, LI Zhi, LIU Yuan-ning, ZHANG Chun-he, CHANG Hao-wu, WANG Zhi-qiang. Human exogenous plant miRNA cross-kingdom regulatory modeling based on high-throughout data [J]. 吉林大学学报(工学版), 2018, 48(4): 1206-1213.
[5] HUANG Lan, JI Lin-ying, YAO Gang, ZHAI Rui-feng, BAI Tian. Construction of disease-symptom semantic net for misdiagnosis prompt [J]. 吉林大学学报(工学版), 2018, 48(3): 859-865.
[6] LI Xiong-fei, FENG Ting-ting, LUO Shi, ZHANG Xiao-li. Automatic music composition algorithm based on recurrent neural network [J]. 吉林大学学报(工学版), 2018, 48(3): 866-873.
[7] LIU Jie, ZHANG Ping, GAO Wan-fu. Feature selection method based on conditional relevance [J]. 吉林大学学报(工学版), 2018, 48(3): 874-881.
[8] WANG Xu, OUYANG Ji-hong, CHEN Gui-fen. Heuristic algorithm of all common subsequences of multiple sequences for measuring multiple graphs similarity [J]. 吉林大学学报(工学版), 2018, 48(2): 526-532.
[9] YANG Xin, XIA Si-jun, LIU Dong-xue, FEI Shu-min, HU Yin-ji. Target tracking based on improved accelerated gradient under tracking-learning-detection framework [J]. 吉林大学学报(工学版), 2018, 48(2): 533-538.
[10] LIU Xue-juan, YUAN Jia-bin, XU Juan, DUAN Bo-jia. Quantum k-means algorithm [J]. 吉林大学学报(工学版), 2018, 48(2): 539-544.
[11] QU Hui-yan, ZHAO Wei, QIN Ai-hong. A fast collision detection algorithm based on optimization operator [J]. 吉林大学学报(工学版), 2017, 47(5): 1598-1603.
[12] LI Jia-fei, SUN Xiao-yu. Clustering method for uncertain data based on spectral decomposition [J]. 吉林大学学报(工学版), 2017, 47(5): 1604-1611.
[13] SHAO Ke-yong, CHEN Feng, WANG Ting-ting, WANG Ji-chi, ZHOU Li-peng. Full state based adaptive control of fractional order chaotic system without equilibrium point [J]. 吉林大学学报(工学版), 2017, 47(4): 1225-1230.
[14] WANG Sheng-sheng, WANG Chuang-feng, GU Fang-ming. Spatio-temporal reasoning for OPRA direction relation network [J]. 吉林大学学报(工学版), 2017, 47(4): 1238-1243.
[15] MA Miao, LI Yi-bin. Multi-level image sequences and convolutional neural networks based human action recognition method [J]. 吉林大学学报(工学版), 2017, 47(4): 1244-1252.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!