Skip to main content
Erschienen in: Natural Computing 3/2009

01.09.2009

Foundations of r-contiguous matching in negative selection for anomaly detection

verfasst von: Thomas Stibor

Erschienen in: Natural Computing | Ausgabe 3/2009

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Negative selection and the associated r-contiguous matching rule is a popular immune-inspired method for anomaly detection problems. In recent years, however, problems such as scalability and high false positive rate have been empirically noticed. In this article, negative selection and the associated r-contiguous matching rule are investigated from a pattern classification perspective. This includes insights in the generalization capability of negative selection and the computational complexity of finding r-contiguous detectors.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
“To find” or “to generate” detectors means the same in this article.
 
2
The symbol * represents either a 1 or 0.
 
3
s[1,…, l] denotes characters of s at positions 1…l.
 
4
The Link between recurrent events, renewal theory and the r-contiguous matching probability was discovered originally in Percus et al. (1993) and rediscovered in Ranang (2002). Percus et al. (1993) presented in the probability approximation (2) which is only valid for r ≥ l/2. However, they also cited Uspensky’s textbook [see pp. 77 in Uspensky (1937)], where the approximation of the r-contiguous matching probability for 1 ≤ r ≤ l is presented.
 
5
The DLL algorithm is sometimes also called DPL or DPLL algorithm (Freeman 1996; Ouyang 1998).
 
6
It is still an open problem to prove where the exact phase transition threshold is located. Latest theoretical work (Achlioptas et al. 2005) shows that the threshold r k lies within the boundary 2.68 < r k  < 4.51 for k = 3.
 
Literatur
Zurück zum Zitat Achlioptas D, Naor A, Peres Y (2005) Rigorous location of phase transitions in hard optimization problems. Nature 435:759–764CrossRef Achlioptas D, Naor A, Peres Y (2005) Rigorous location of phase transitions in hard optimization problems. Nature 435:759–764CrossRef
Zurück zum Zitat Ayara M, Timmis J, de Lemos R, de Castro LN, Duncan R (2002) Negative selection: how to generate detectors. In: Proceedings of the 1nd International Conference on Artificial Immune Systems (ICARIS), pp 89–98. University of Kent at Canterbury Printing Unit Ayara M, Timmis J, de Lemos R, de Castro LN, Duncan R (2002) Negative selection: how to generate detectors. In: Proceedings of the 1nd International Conference on Artificial Immune Systems (ICARIS), pp 89–98. University of Kent at Canterbury Printing Unit
Zurück zum Zitat Balthrop J, Forrest S, Glickman M (2002) Revisiting lisys: Parameters and normal behavior. In: Proceedings of congress on evolutionary computation (CEC). IEEE Press, New York, pp 1045–1050 Balthrop J, Forrest S, Glickman M (2002) Revisiting lisys: Parameters and normal behavior. In: Proceedings of congress on evolutionary computation (CEC). IEEE Press, New York, pp 1045–1050
Zurück zum Zitat Bishop CM (1994) Novelty detection and neural network validation. IEE Proceedings - Vision, Image and Signal processing 141(4):217–222CrossRef Bishop CM (1994) Novelty detection and neural network validation. IEE Proceedings - Vision, Image and Signal processing 141(4):217–222CrossRef
Zurück zum Zitat Brueggemann T, Kern W (2004) An improved deterministic local search algorithm for 3-SAT. Theoretical Computer Science 329(1–3):303–313MATHCrossRefMathSciNet Brueggemann T, Kern W (2004) An improved deterministic local search algorithm for 3-SAT. Theoretical Computer Science 329(1–3):303–313MATHCrossRefMathSciNet
Zurück zum Zitat Cormen TH, Leiserson CE, Rivest RL, Stein C (2002) Introduction to algorithms, 2nd edn. MIT Press, Cambridge Cormen TH, Leiserson CE, Rivest RL, Stein C (2002) Introduction to algorithms, 2nd edn. MIT Press, Cambridge
Zurück zum Zitat Dasgupta D, Forrest S (1995) Tool breakage detection in milling operations using a negative-selection algorithm. Tech. Rep. CS95-5, University of New Mexico Dasgupta D, Forrest S (1995) Tool breakage detection in milling operations using a negative-selection algorithm. Tech. Rep. CS95-5, University of New Mexico
Zurück zum Zitat Dasgupta D, Forrest S (1996) Novelty detection in time series data using ideas from immunology. In: Proceedings of the 5th international conference on intelligent systems, pp 82–87 Dasgupta D, Forrest S (1996) Novelty detection in time series data using ideas from immunology. In: Proceedings of the 5th international conference on intelligent systems, pp 82–87
Zurück zum Zitat Dasgupta D, Forrest S (1998) Artificial immune systems and their applications, Chapter. An anomaly detection algorithm inspired by the immune system. Springer-Verlag, NY, pp 262–277 Dasgupta D, Forrest S (1998) Artificial immune systems and their applications, Chapter. An anomaly detection algorithm inspired by the immune system. Springer-Verlag, NY, pp 262–277
Zurück zum Zitat de Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer Verlag, London de Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer Verlag, London
Zurück zum Zitat D’haeseleer P, Forrest S, Helman P (1996) An immunological approach to change detection: algorithms, analysis, and implications. In: Proceedings of the Symposium on Research in Security and Privacy, pp 110–119. IEEE Computer Society Press D’haeseleer P, Forrest S, Helman P (1996) An immunological approach to change detection: algorithms, analysis, and implications. In: Proceedings of the Symposium on Research in Security and Privacy, pp 110–119. IEEE Computer Society Press
Zurück zum Zitat Esponda F, Forrest S (2002) Detector coverage under the r-contiguous bits matching rule. Tech. Rep. TR-CS-2002-03, University of New Mexico Esponda F, Forrest S (2002) Detector coverage under the r-contiguous bits matching rule. Tech. Rep. TR-CS-2002-03, University of New Mexico
Zurück zum Zitat Esponda F, Forrest S, Helman P (2003) The crossover closure and partial match detection. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 249–260 Esponda F, Forrest S, Helman P (2003) The crossover closure and partial match detection. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 249–260
Zurück zum Zitat Feller W (1968) An introduction to probability theory and its applications, vol 1, 3rd edn. Wiley, NY Feller W (1968) An introduction to probability theory and its applications, vol 1, 3rd edn. Wiley, NY
Zurück zum Zitat Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proceedings of the Symposium on Research in Security and Privacy. IEEE Computer Society Press, pp 202–212 Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. In: Proceedings of the Symposium on Research in Security and Privacy. IEEE Computer Society Press, pp 202–212
Zurück zum Zitat Freeman JW (1996) Hard random 3-SAT problems and the Davis–Putnam procedure. Artificial Intelligence 81(1–2):183–198CrossRefMathSciNet Freeman JW (1996) Hard random 3-SAT problems and the Davis–Putnam procedure. Artificial Intelligence 81(1–2):183–198CrossRefMathSciNet
Zurück zum Zitat Freitas AA, Timmis J (2003) Revisiting the foundations of artificial immune systems: a problem-oriented perspective. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 229–241 Freitas AA, Timmis J (2003) Revisiting the foundations of artificial immune systems: a problem-oriented perspective. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 229–241
Zurück zum Zitat Gent IP, Walsh T (1994) The SAT phase transition. In: Proceedings of the 11th European conference on artificial intelligence. Wiley, NY, pp 105–109 Gent IP, Walsh T (1994) The SAT phase transition. In: Proceedings of the 11th European conference on artificial intelligence. Wiley, NY, pp 105–109
Zurück zum Zitat Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2):179–212CrossRef Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2):179–212CrossRef
Zurück zum Zitat González F, Dasgupta D, Gómez J (2003) The effect of binary matching rules in negative selection. In: Genetic and evolutionary computation—GECCO. Lecture Notes in Computer Science, vol 2723. Springer-Verlag, Chicago, pp 195–206 González F, Dasgupta D, Gómez J (2003) The effect of binary matching rules in negative selection. In: Genetic and evolutionary computation—GECCO. Lecture Notes in Computer Science, vol 2723. Springer-Verlag, Chicago, pp 195–206
Zurück zum Zitat Hofmeister T, Schöning U, Schuler R, Watanabe O (2002) A probabilistic 3-SAT algorithm further improved. In: 19th Annual symposium on theoretical aspects of computer science (STACS), Lecture Notes in Computer Science, vol 2285. Springer-Verlag, NY, pp 192–202 Hofmeister T, Schöning U, Schuler R, Watanabe O (2002) A probabilistic 3-SAT algorithm further improved. In: 19th Annual symposium on theoretical aspects of computer science (STACS), Lecture Notes in Computer Science, vol 2285. Springer-Verlag, NY, pp 192–202
Zurück zum Zitat Hofmeyr SA (1999) An immunological model of distributed detection and its application to computer security. Ph.D. thesis, University of New Mexico, Albuquerque, NM Hofmeyr SA (1999) An immunological model of distributed detection and its application to computer security. Ph.D. thesis, University of New Mexico, Albuquerque, NM
Zurück zum Zitat Mitchell T (1997) Machine learning. McGraw Hill Mitchell T (1997) Machine learning. McGraw Hill
Zurück zum Zitat Ouyang M (1998) How good are branching rules in DPLL. Discrete Applied Mathematics 89(1–3):281–286MATHCrossRef Ouyang M (1998) How good are branching rules in DPLL. Discrete Applied Mathematics 89(1–3):281–286MATHCrossRef
Zurück zum Zitat Percus JK, Percus OE, Perelson AS (1993) Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. Proc Natl Acad Sci USA 90:1691–1695CrossRef Percus JK, Percus OE, Perelson AS (1993) Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. Proc Natl Acad Sci USA 90:1691–1695CrossRef
Zurück zum Zitat Ranang MT (2002) An artificial immune system approach to preserving security in computer networks. Master’s thesis, Norges Teknisk-Naturvitenskapelige Universitet Ranang MT (2002) An artificial immune system approach to preserving security in computer networks. Master’s thesis, Norges Teknisk-Naturvitenskapelige Universitet
Zurück zum Zitat Reischuk KR (1990) Einführung in die Komplexitätstheorie. BG Teubner, Stuttgart Reischuk KR (1990) Einführung in die Komplexitätstheorie. BG Teubner, Stuttgart
Zurück zum Zitat Schölkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Computation 13(7):1443–1471MATHCrossRef Schölkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Computation 13(7):1443–1471MATHCrossRef
Zurück zum Zitat Selman B, Mitchell DG, Levesque HJ (1996) Generating hard satisfiability problems. Artificial Intelligence 81(1–2):17–29CrossRefMathSciNet Selman B, Mitchell DG, Levesque HJ (1996) Generating hard satisfiability problems. Artificial Intelligence 81(1–2):17–29CrossRefMathSciNet
Zurück zum Zitat Singh S (2002) Anomaly detection using negative selection based on the r-contiguous matching rule. In: Proceedings of the 1st international conference on artificial immune systems (ICARIS). Unversity of Kent at Canterbury Printing Unit, pp 99–106 Singh S (2002) Anomaly detection using negative selection based on the r-contiguous matching rule. In: Proceedings of the 1st international conference on artificial immune systems (ICARIS). Unversity of Kent at Canterbury Printing Unit, pp 99–106
Zurück zum Zitat Steinwart I, Hush D, Scovel C (2005) A classification framework for anomaly detection. Journal of Machine Learning Research 6:211–232MathSciNet Steinwart I, Hush D, Scovel C (2005) A classification framework for anomaly detection. Journal of Machine Learning Research 6:211–232MathSciNet
Zurück zum Zitat Stibor T, Timmis J, Eckert C (2006a) Generalization regions in hamming negative selection. In: Intelligent information processing and web mining, advances in soft computing. Springer-Verlag, Germany, pp 447–456 Stibor T, Timmis J, Eckert C (2006a) Generalization regions in hamming negative selection. In: Intelligent information processing and web mining, advances in soft computing. Springer-Verlag, Germany, pp 447–456
Zurück zum Zitat Stibor T, Timmis J, Eckert C (2006b) The link between r-contiguous detectors and k-CNF satisfiability. In: Proceedings of congress on evolutionary computation (CEC). IEEE Press, New York, USA, pp 491–498 Stibor T, Timmis J, Eckert C (2006b) The link between r-contiguous detectors and k-CNF satisfiability. In: Proceedings of congress on evolutionary computation (CEC). IEEE Press, New York, USA, pp 491–498
Zurück zum Zitat Tarassenko L, Hayton P, Cerneaz N, Brady M (1995) Novelty detection for the identification of masses in mammograms. In: Proceedings of the 4th IEE international conference on artificial neural networks, pp 442–447 Tarassenko L, Hayton P, Cerneaz N, Brady M (1995) Novelty detection for the identification of masses in mammograms. In: Proceedings of the 4th IEE international conference on artificial neural networks, pp 442–447
Zurück zum Zitat Tax DMJ, Duin RPW (1999) Data domain description using support vectors. In: European symposium on artificial neural networks—ESANN, pp 251–256 Tax DMJ, Duin RPW (1999) Data domain description using support vectors. In: European symposium on artificial neural networks—ESANN, pp 251–256
Zurück zum Zitat Taylor DW, Corne DW (2003) An investigation of the negative selection algorithm for fault detection in refrigeration systems. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 34–45 Taylor DW, Corne DW (2003) An investigation of the negative selection algorithm for fault detection in refrigeration systems. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 34–45
Zurück zum Zitat Uspensky JV (1937) Introduction to mathematical probability. McGraw-Hill Uspensky JV (1937) Introduction to mathematical probability. McGraw-Hill
Zurück zum Zitat Wierzchoń ST (2000a) Generating optimal repertoire of antibody strings in an artificial immune system. In: Intelligent Information Systems. Springer Verlag, NY, pp 119–133 Wierzchoń ST (2000a) Generating optimal repertoire of antibody strings in an artificial immune system. In: Intelligent Information Systems. Springer Verlag, NY, pp 119–133
Zurück zum Zitat Wierzchoń ST (2000b) Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology 1(3):1–13 Wierzchoń ST (2000b) Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology 1(3):1–13
Metadaten
Titel
Foundations of r-contiguous matching in negative selection for anomaly detection
verfasst von
Thomas Stibor
Publikationsdatum
01.09.2009
Verlag
Springer Netherlands
Erschienen in
Natural Computing / Ausgabe 3/2009
Print ISSN: 1567-7818
Elektronische ISSN: 1572-9796
DOI
https://doi.org/10.1007/s11047-008-9097-5

Weitere Artikel der Ausgabe 3/2009

Natural Computing 3/2009 Zur Ausgabe

Premium Partner