Computational geometry: an introduction
Computational geometry: an introduction
An adaptive algorithm for modifying hyperellipsoidal decision surfaces
Journal of Artificial Neural Networks
Machine learning, neural and statistical classification
Machine learning, neural and statistical classification
Artificial Immune Systems: A New Computational Intelligence Paradigm
Artificial Immune Systems: A New Computational Intelligence Paradigm
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Anomaly Detection Using Real-Valued Negative Selection
Genetic Programming and Evolvable Machines
A retrovirus inspired algorithm for virus detection & optimization
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Revisiting Negative Selection Algorithms
Evolutionary Computation
Combatting financial fraud: a coevolutionary anomaly detection approach
Proceedings of the 10th annual conference on Genetic and evolutionary computation
A negative selection algorithm for classification and reduction of the noise effect
Applied Soft Computing
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage
Information Sciences: an International Journal
On average time complexity of evolutionary negative selection algorithms for anomaly detection
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Hybrid detector based negative selection algorithm
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel immune inspired approach to fault detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
Towards efficient and effective negative selection algorithm: a convex hull representation scheme
SEAL'10 Proceedings of the 8th international conference on Simulated evolution and learning
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Hi-index | 0.00 |
This paper introduces hyper-ellipsoids as an improvement to hyper-spheres as intrusion detectors in a negative selection problem within an artificial immune system. Since hyper-spheres are a specialization of hyper-ellipsoids, hyper-ellipsoids retain the benefits of hyper-spheres. However, hyper-ellipsoids are much more flexible, mostly in that they can be stretched and reoriented. The viability of using hyper-ellipsoids is established using several pedagogical problems. We conjecture that fewer hyper-ellipsoids than hyper-spheres are needed to achieve similar coverage of nonself space in a negative selection problem. Experimentation validates this conjecture. In pedagogical benchmark problems, the number of hyper-ellipsoids to achieve good results is significantly (~50%) smaller than the associated number of hyper-spheres.