On The Use Of Negative Selection In An Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
An Immunological Approach to Change Detection: Theoretical Results
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Parzen-Window Network Intrusion Detectors
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 4 - Volume 4
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
LIBSVM: A library for support vector machines
ACM Transactions on Intelligent Systems and Technology (TIST)
An introduction to kernel-based learning algorithms
IEEE Transactions on Neural Networks
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Immune anomaly detection enhanced with evolutionary paradigms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
Revisiting Negative Selection Algorithms
Evolutionary Computation
Application areas of AIS: The past, the present and the future
Applied Soft Computing
Improving accuracy of immune-inspired malware detectors by using intelligent features
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Hardware Acceleration of an Immune Network Inspired Evolutionary Algorithm for Medical Diagnosis
ICES '08 Proceedings of the 8th international conference on Evolvable Systems: From Biology to Hardware
A negative selection algorithm for classification and reduction of the noise effect
Applied Soft Computing
T-detector maturation algorithm with overlap rate
WSEAS Transactions on Computers
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage
Information Sciences: an International Journal
Integrating real-time analysis with the dendritic cell algorithm through segmentation
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Storage-Based Intrusion Detection Using Artificial Immune Technique
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
A novel immune inspired approach to fault detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A novel parallel clustering algorithm based on artificial immune network using nVidia CUDA framework
HCII'11 Proceedings of the 14th international conference on Human-computer interaction: design and development approaches - Volume Part I
Fault detection in analog circuits using a fuzzy dendritic cell algorithm
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
On the use of hyperspheres in artificial immune systems as antibody recognition regions
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Theoretical basis of novelty detection in time series using negative selection algorithms
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Real-Valued negative selection algorithm with variable-sized self radius
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Negative selection algorithm based on grid file of the feature space
Knowledge-Based Systems
Hi-index | 0.00 |
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed to overcome scaling problems inherent in the hamming shape-space negative selection algorithm. In this paper, we investigate termination behavior of the real-valued negative selection algorithm with variable-sized detectors on an artificial data set. We then undertake an analysis and comparison of the classification performance on the high-dimensional KDD data set of the real-valued negative selection, a real-valued positive selection and statistical anomaly detection techniques. Results reveal that in terms of detection rate, real-valued negative selection with variable-sized detectors is not competitive to statistical anomaly detection techniques on the KDD data set. In addition, we suggest that the termination guarantee of the real-valued negative selection with variable-sized detectors is very sensitive to several parameters.