[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1143997.1144017acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
Article

Applicability issues of the real-valued negative selection algorithms

Published: 08 July 2006 Publication History

Abstract

The paper examines various applicability issues of the negative selection algorithms (NSA). Recently, concerns were raised on the use of NSAs, especially those using real-valued representation. In this paper, we argued that many reported issues are either due to improper usage of the method or general difficulties which are not specific to negative selection algorithms. On the contrary, the experiments with synthetic data and well-known real-world data show that NSAs have great flexibility to balance between efficiency and robustness, and to accommodate domain-oriented elements in the method, e.g. various distance measures. It is to be noted that all methods are not suitable for all datasets and data representation plays a major role.

References

[1]
H. T. Ceong, Y.-I. Kim, D. Lee, and K.-H. Lee. Complementary dual detectors for effective classification. In Proceedings of Second International Conference on Artificial Immune System (ICARIS 2003), 2003.
[2]
D. Dasgupta and F. Gonzalez. An immunity-based technique to characterize intrusion in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):1081--1088, June 2002.
[3]
S. Forrest, A. Perelson, L. Allen, R., and Cherukuri. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, 1994. IEEE Computer Society Press.
[4]
A. A. Freitas and J. Timmis. Revisiting the foundation of artificial immune systems: A problem-oriented perspective. In Proceedings of Second International Conference on Artificial Immune System (ICARIS 2003), 2003.
[5]
S. M. Garrett. How do we evaluate artificial immune systems? Evolutionary Computation, 13(2):145--178, 2005.
[6]
F. González, D. Dasgupta, and J. Gómez. The effect of binary matching rules in negative selection. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2003), LNCS 2723, pages 195--206, Chicago, IL, July 2003. Springer.
[7]
F. González, D. Dasgupta, and L. F. Nino. A randomized real-value negative selection algorithm. In Proceedings of Second International Conference on Artificial Immune System (ICARIS 2003), September 2003.
[8]
F. A. Gonz&3225;lez and D. Dasgupta. Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines, 4:383--403, 2003.
[9]
E. Hart. Not all balls are round: An investigation of alternative recognition-region shapes. In ICARIS, pages 29--42, 2005.
[10]
Z. Ji. A boundary-aware negative selection algorithm. In Proceedings of IASTED International Conference of Artificial Intelligence and Soft Coomputing (ASC 2005), Spain, September 2005.
[11]
Z. Ji and D. Dasgupta. Real-valued negative selection algorithm with variable-sized detectors. In LNCS 3102, Proceedings of GECCO, pages 287--298, 2004.
[12]
Z. Ji and D. Dasgupta. Estimating the detector coverage in a negative selection algorithm. In H.-G. B. et al, editor, GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, volume 1, pages 281--288, Washington DC, USA, 25-29 June 2005. ACM Press.
[13]
D.-W. Lee and K.-B. Sim. Negative selection for DNA sequence classification. In Proceedings of Joint 2nd International Conference on Soft Computing and Intelligent Systems and 5th International Symposium on Advanced Intelligent Systems (SCIS & ISIS 2004), Yokohama, Japan, Sept 2004.
[14]
R. E. Sanchez-Yanez, E. V. Kurmyshev, and A. Fernandez. One-class texture classifier in the CCR feature space. Pattern Recognition Letters, 24:1503--1511, 2003.
[15]
J. M. Shapiro, G. B. Lamont, and G. L. Peterson. An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection. In H.-G. B. et al, editor, GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, volume 1, pages 337--344, Washington DC, USA, 25-29 June 2005. ACM Press.
[16]
T. Stibor, P. Mohr, J. Timmis, and C. Eckert. Is negative selection appropriate for anomaly detection? In H.-G. B. et al, editor, GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, volume 1, pages 321--328, Washington DC, USA, 25-29 June 2005. ACM Press.
[17]
T. Stibor, J. Timmis, and C. Eckert. A comparative study of real-valued negative selection to statistical anomaly detection techniques. In ICARIS, pages 262--275, 2005.
[18]
D. M. J. Tax. One-class classification. PhD thesis, Technische Universiteit Delft, 2001.
[19]
D. W. Taylor and D. W. Corne. An investation of the negative selection algorithm for fault detection in refrigeration system. In Proceedings of Second International Conference on Artificial Immune System (ICARIS 2003), 2003.

Cited By

View all
  • (2022)Negative Selection Algorithm Research and Applications in the Last Decade: A ReviewIEEE Transactions on Artificial Intelligence10.1109/TAI.2021.31146613:2(110-128)Online publication date: Apr-2022
  • (2022)NKA: a pathogen dose-based natural killer cell algorithm and its application to classificationThe Journal of Supercomputing10.1007/s11227-021-04133-478:5(7016-7037)Online publication date: 1-Apr-2022
  • (2022)An efficient self-organized traffic maintenance scheme employing positive selection algorithmMultimedia Tools and Applications10.1007/s11042-022-13174-781:23(33107-33125)Online publication date: 1-Sep-2022
  • Show More Cited By

Index Terms

  1. Applicability issues of the real-valued negative selection algorithms

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GECCO '06: Proceedings of the 8th annual conference on Genetic and evolutionary computation
    July 2006
    2004 pages
    ISBN:1595931864
    DOI:10.1145/1143997
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 July 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. negative selection algorithms
    2. one-class classification

    Qualifiers

    • Article

    Conference

    GECCO06
    Sponsor:
    GECCO06: Genetic and Evolutionary Computation Conference
    July 8 - 12, 2006
    Washington, Seattle, USA

    Acceptance Rates

    GECCO '06 Paper Acceptance Rate 205 of 446 submissions, 46%;
    Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Negative Selection Algorithm Research and Applications in the Last Decade: A ReviewIEEE Transactions on Artificial Intelligence10.1109/TAI.2021.31146613:2(110-128)Online publication date: Apr-2022
    • (2022)NKA: a pathogen dose-based natural killer cell algorithm and its application to classificationThe Journal of Supercomputing10.1007/s11227-021-04133-478:5(7016-7037)Online publication date: 1-Apr-2022
    • (2022)An efficient self-organized traffic maintenance scheme employing positive selection algorithmMultimedia Tools and Applications10.1007/s11042-022-13174-781:23(33107-33125)Online publication date: 1-Sep-2022
    • (2021)A survey of intrusion detection techniques based on negative selection algorithmInternational Journal of System Assurance Engineering and Management10.1007/s13198-021-01357-813:S1(175-185)Online publication date: 9-Nov-2021
    • (2018)Three Branches of Negative Representation of Information: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2018.28299072:6(411-425)Online publication date: Dec-2018
    • (2018)Immune ComputingUnconventional Computing10.1007/978-1-4939-6883-1_282(503-518)Online publication date: 26-Aug-2018
    • (2017)A Negative Selection Immune System Inspired Methodology for Fault Diagnosis of Wind TurbinesIEEE Transactions on Cybernetics10.1109/TCYB.2016.258238447:11(3799-3813)Online publication date: Nov-2017
    • (2016)An efficient proactive artificial immune system based anomaly detection and prevention systemExpert Systems with Applications: An International Journal10.1016/j.eswa.2016.03.04260:C(311-320)Online publication date: 30-Oct-2016
    • (2015)ImmunecomputingEncyclopedia of Complexity and Systems Science10.1007/978-3-642-27737-5_282-3(1-16)Online publication date: 22-Sep-2015
    • (2014)Negative selection algorithm for monitoring processes with large number of variables2014 IEEE Conference on Control Applications (CCA)10.1109/CCA.2014.6981435(778-783)Online publication date: Oct-2014
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media