[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-540-32003-6_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Unsupervised anomaly detection based n an evolutionary artificial immune network

Published: 30 March 2005 Publication History

Abstract

To solve the problem of unsupervised anomaly detection, an unsupervised anomaly-detecting algorithm based on an evolutionary artificial immune network is proposed in this paper. An evolutionary artificial immune network is “evolved” by using unlabeled training sample data to represent the distribution of the original input data set. Then a traditional hierarchical agglomerative clustering method is employed to perform clustering analysis within the algorithm. It is shown that the algorithm is feasible and effective with simulations over the 1999 KDD CUP dataset.

References

[1]
D. E. Denning: An intrusion detection model. IEEE Transactions on Software Engineering, SE-13: 222-232, 1987.
[2]
E. Eskin: Anomaly detection over noisy data using learned probability distribution. Proceedings of the International Conference on Machine Learning, 2000.
[3]
Eleazar Eskin, Salvatore Stolfo, etc.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. Data Mining for Security Applications, Kluwer, 2002.
[4]
Leonid Portnoy: Intrusion Detection with Unlabeled Data using Clustering. Undergraduate Thesis, Columbia University: December 2000.
[5]
LUO Min, WANG Li-na, ZHANG Huan-guo: An Unsupervised Clustering-Based Intrusion Detection Method. ACTA ELECTRONICA SINICA, 2003, vol.30 (11): 1713-1716.
[6]
Michael J. Prerau, Eleazar Eskin: Unsupervised Anomaly Detection Using an Optimized K-Nearest Neighbors Algorithm. Undergraduate Thesis, Columbia University: December 2000
[7]
Leandro Nunes de Castro, Fenando J. Von Zuben: An Evolutionary Immune Network for Data Clustering. Proc. of the IEEE SBRN, pp.84-89, November, 2000
[8]
Leandro N. de Castro, Jon Timmis. Hierarchy and Convergence of Immune Networks: Basic Ideas and Preliminary Results, 1stICARIS, 2002
[9]
KDD99. KDD99 cup dataset: http://kdd.ics.uci.edu/databases/kddcup99/kddcup.html, 1999
[10]
Jiao Licheng, Du Haifeng: An Artificial Immune System: Progress and Prospect, ACTA ELECTRONICA SINICA, 2003, 31(10): 1540~1549
[11]
F. M. Burnett: The Clonal Selection Theory of Immunity. Vanderbilt University Press, Nashville, 1959.
[12]
N. K. Jerne: Towards a Network Theory of the Immune System. Ann. Immunol. (Inst. Pasteur) 125C, p373-389, 1974.
[13]
Results of the KDD'99 Classifier Learning Contest. http://wwwcse.ucsd.edu/users/elkan/ clresults.html

Cited By

View all
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2009)Anomaly detection inspired by immune network theoryProceedings of the Eleventh conference on Congress on Evolutionary Computation10.5555/1689599.1690005(3045-3051)Online publication date: 18-May-2009
  • (2006)Intrusion detection based on clustering organizational co-evolutionary classificationProceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery10.1007/11881599_139(1113-1120)Online publication date: 24-Sep-2006
  1. Unsupervised anomaly detection based n an evolutionary artificial immune network

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    EC'05: Proceedings of the 3rd European conference on Applications of Evolutionary Computing
    March 2005
    628 pages
    ISBN:3540253963
    • Editors:
    • Franz Rothlauf,
    • Jürgen Branke,
    • Stefano Cagnoni,
    • David Wolfe Corne,
    • Rolf Drechsler

    Sponsors

    • EvoNet
    • University of Lausanne: University of Lausanne

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 30 March 2005

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
    • (2009)Anomaly detection inspired by immune network theoryProceedings of the Eleventh conference on Congress on Evolutionary Computation10.5555/1689599.1690005(3045-3051)Online publication date: 18-May-2009
    • (2006)Intrusion detection based on clustering organizational co-evolutionary classificationProceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery10.1007/11881599_139(1113-1120)Online publication date: 24-Sep-2006

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media