The T-detectors maturation algorithm based on match range model
Proceedings of the 2005 ACM symposium on Applied computing
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Unsupervised anomaly detection in network intrusion detection using clusters
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Engineering Applications of Artificial Intelligence
Revisiting Negative Selection Algorithms
Evolutionary Computation
Integrated platform of artificial immune system for anomaly detection
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
Combatting financial fraud: a coevolutionary anomaly detection approach
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Negative Selection with Antigen Feedback in Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A negative selection algorithm for classification and reduction of the noise effect
Applied Soft Computing
ACM Computing Surveys (CSUR)
A Sense of `Danger' for Windows Processes
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Computational Statistics & Data Analysis
Hybrid detector based negative selection algorithm
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel immune inspired approach to fault detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Towards a novel immune inspired approach to temporal anomaly detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Decentralized detector generation in cooperative intrusion detection systems
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
A generative model for self/non-self discrimination in strings
ICANNGA'09 Proceedings of the 9th international conference on Adaptive and natural computing algorithms
A Survey of artificial immune applications
Artificial Intelligence Review
A reference based analysis framework for analyzing system call traces
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Deviance from perfection is a better criterion than closeness to evil when identifying risky code
Proceedings of the IEEE/ACM international conference on Automated software engineering
Artificial immune classifier with swarm learning
Engineering Applications of Artificial Intelligence
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
An immune memory clonal algorithm for numerical and combinatorial optimization
Frontiers of Computer Science in China
Sequence diagram to colored Petri nets transformation testing: an immune system metaphor
Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research
Towards efficient and effective negative selection algorithm: a convex hull representation scheme
SEAL'10 Proceedings of the 8th international conference on Simulated evolution and learning
Example-based model-transformation testing
Automated Software Engineering
Dynamic negative selection algorithm based on match range model
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
The t-detectors maturation algorithm based on genetic algorithm
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Self-regulating method for model library based artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Network anomaly behavior detection using an adaptive multiplex detector
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Real-Valued negative selection algorithm with variable-sized self radius
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
An Affinity Based Complex Artificial Immune System
International Journal of Digital Library Systems
Model-based validation of streaming data: (industry article)
Proceedings of the 7th ACM international conference on Distributed event-based systems
Negative selection algorithm based on grid file of the feature space
Knowledge-Based Systems
Data Mining and Knowledge Discovery
Review: A review of novelty detection
Signal Processing
Hi-index | 0.00 |
This paper describes a real-valued representation for the negative selection algorithm and its applications to anomaly detection. In many anomaly detection applications, only positive (normal) samples are available for training purpose. However, conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. This approach uses only normal samples to generate abnormal samples, which are used as input to a classification algorithm. This hybrid approach is compared against an anomaly detection technique that uses self-organizing maps to cluster the normal data sets (samples). Experiments are performed with different data sets and some results are reported.