Skip to main content
Log in

An immune optimization based real-valued negative selection algorithm

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Negative selection algorithms are important for artificial immune systems to produce detectors. But there are problems such as high time complexity, large number of detectors, a lot of redundant coverage between detectors in traditional negative selection algorithms, resulting in low efficiency for detectors’ generation and limitations in the application of immune algorithms. Based on the distribution of self set in morphological space, the algorithm proposed in this paper introduces the immune optimization mechanism, and produces candidate detectors hierarchically from far to near, with selves as the center. First, the self set is regarded as the evolution population. After immune optimization operations, detectors of the first level are generated which locate far away from the self space and cover larger non-self space, achieving that fewer detectors cover as much non-self space as possible. Then, repeat the process to obtain the second level detectors which locate close to detectors of the first level and near the self space and cover smaller non-self space, reducing detection loopholes. By analogy, qualified detector set will be obtained finally. In detectors’ generation process, the random production range of detectors is limited, and the self-reaction rate between candidate detectors is smaller, which effectively reduces the number of mature detectors and redundant coverage. Theoretical analysis demonstrates that the time complexity is linear with the size of self set, which greatly reduces the influence of growth of self scales over the time complexity. Experimental results show that IO-RNSA has better time efficiency and generation quality than classical negative selection algorithms, and improves detection rate and decreases false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Jin ZZ, Liao MH, Xiao G (2013) Survey of negative selection algorithms. J Commun 34(1):159–170

    Google Scholar 

  2. Dasgupta D, Yu S, Nino F (2011) Recent advances in artificial immune systems–models and applications. Appl Soft Comput 11:1574–1587

    Article  Google Scholar 

  3. Stibor T, Timmis J, Eckert C (2005) On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system. In: Proceedings of IEEE evolutionary computation. IEEE Computer Society Press, Edinburgh, pp 995–1002

  4. Timmis J, Hone A, Stibor T, Clark E (2008) Theoretical advances in artificial immune systems. Theor Comput Sci 403:11–32

    Article  MATH  MathSciNet  Google Scholar 

  5. Bretscher P, Cohn M (1970) A theory of self-nonself discrimination. Science 169:1042–1049

    Article  Google Scholar 

  6. D’Haeseleer P, Forrest S, Helman P (1996) Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, Washington, pp 110–120

  7. Sobh TS, Mostafa WM (2011) A cooperative immunological approach for detecting network anomaly. Applied Soft Computing 11:1275–1283

    Article  Google Scholar 

  8. Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Trans Evol Comput 6(3):281–294

    Article  Google Scholar 

  9. Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self–nonself discrimination in a computer. In: Proceeding of the IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Computer Society Press, pp 202–212

  10. Balthrop J, Esponda F, Forrest S et al (2002) Coverage and generalization in an artificial immune system. GECCO 2002. Morgan Kaufmann Publishers Inc, New York, pp 3–10

  11. Gonzalez F, Dasgupta D (2003) Anomaly detection using real-valued negative selection. Genet Program Evolvable Mach 4:383–403

    Article  Google Scholar 

  12. Zhou J (2006) Negative selection algorithms: from the thymus to V-detector. Ph. D dissertation, University of Memphis, Memphis, TN, USA

  13. Zhou J, Dasgupta D (2009) V-detector: an efficient negative selection algorithm with “probably adequate” detector coverage. Inf Sci 19(9):1390–1406

    Google Scholar 

  14. Joseph M, Shapir O, Gary B (2005) An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection[A]. GECCO 2005[C]. Washington DC, USA, pp 337–344

  15. Ostaszewski M, Seredynski F, Bouvry P (2006) Immune anomaly detection enhanced with evolutionary paradigms. In: 8th annual conference on genetic and evolutionary computation (GECCO 2006), Seattle, Washington, USA

  16. Zhang XM, Yi ZX, Song JS et al (2010) Research on negative selection algorithm based on matrix representation. J Electron Inf Technol 32(11):2701–2706

    Article  Google Scholar 

  17. Gao XZ, Ovaska SJ, Wang X (2006) Genetic algorithms-based detector generation in negative selection algorithm. In: 2006 IEEE mountain workshop on adaptive and learning systems

  18. Yang DY, Chen JY (2009) Research on detector generation algorithm based on multiple populations GA. Acta Automatica Sinica 35(4):425–432

    Google Scholar 

  19. Stibor T (2008) An empirical study of self/non-self discrimination in binary data with a kernel estimator. In: 7th international conference on artificial immune systems, Phuket, Thailand

  20. Chen W, Liu XJ, Li T et al (2011) A negative selection algorithm based on hierarchical clustering of self set and its application in anomaly detection. Int J Comput Intell Syst 4 (4):410–419

    Article  MathSciNet  Google Scholar 

  21. Stibor T, Philipp M, Jonathan T (2005) Is negative selection appropriate for anomaly detection? In: Proceedings of IEEE Evolutionary Computation. IEEE Computer Society Press, Edinburgh, pp 569–576

  22. Caldas B, Pita M, Buarque F (2007) How to obtain appropriate executive decisions using artificial immunologic systems. In: 6th international conference on artificial immune systems, Santos, Brazil

  23. Ma W, Tran D, Sharma D (2008) Negative selection with antigen feedback in intrusion detection. In: 7th international conference on Artificial Immune Systems, Phuket, Thailand

  24. Ou CM (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neuro Comput 88:78–86

    Google Scholar 

  25. UCI Dataset. http://archive.ics.uci.edu/ml/datasets

  26. de Castro LN, Timmis J (2002) An artificial immune network for multimodal function optimization. In: IEEE world congress on evolutionary computation, pp 699–704

  27. de Castro LN, Fernando J (2002) Learning and Optimization Using the Clonal Selection Principle. IEEE transactions on evolutionary computation. Special Issue on Artificial Immune Systems 6(3):239–251

    Google Scholar 

  28. Cai T, Ju SG, Zhong W (2009) A cutting based detector generating and matching algorithm. Acta Electronica Sinica 7(B04):131–134

    Google Scholar 

  29. Lasisi A, Ghazali R, Herawan T (2014) Negative selection algorithm: a survey on the epistemology of generating detectors. Lect Notes Electr Eng 285:167–176

    Article  Google Scholar 

Download references

Acknowledgments

This work has been supported by the National Natural Science Foundation of China under Grant No. 61173159, the National Natural Science Foundation of China under Grant No. 60873246, and the Cultivation Fund of the Key Scientific and Technical Innovation Project, Ministry of Education of China under Grant No. 708075.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Xiao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiao, X., Li, T. & Zhang, R. An immune optimization based real-valued negative selection algorithm. Appl Intell 42, 289–302 (2015). https://doi.org/10.1007/s10489-014-0599-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-014-0599-9

Keywords

Navigation