2005
DOI: 10.1007/11536444_20
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
87
0
2

Year Published

2006
2006
2013
2013

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 110 publications
(89 citation statements)
references
References 7 publications
0
87
0
2
Order By: Relevance
“…As pointed out in (Stibor et al, 2005), the NSA (no matter binary string version or real-valued version) have numerous problems: firstly they cannot avoid the curse of dimensionality, and not applicable to data with high dimensionality; secondly, the detector generation can result holes within the shape-space, so it is difficult to cover just non-self, and it either generates the population of detectors covering both non-self and unseen self (over-fit) or only covering partial non-self (under-fit); thirdly, the NSA still take extensive time period to generate the adequately complete set of detectors. Therefore, negative selection is insufficient and not suitable for anomaly detection.…”
Section: The Nsa Based Approachesmentioning
confidence: 79%
See 1 more Smart Citation
“…As pointed out in (Stibor et al, 2005), the NSA (no matter binary string version or real-valued version) have numerous problems: firstly they cannot avoid the curse of dimensionality, and not applicable to data with high dimensionality; secondly, the detector generation can result holes within the shape-space, so it is difficult to cover just non-self, and it either generates the population of detectors covering both non-self and unseen self (over-fit) or only covering partial non-self (under-fit); thirdly, the NSA still take extensive time period to generate the adequately complete set of detectors. Therefore, negative selection is insufficient and not suitable for anomaly detection.…”
Section: The Nsa Based Approachesmentioning
confidence: 79%
“…Initially AIS were based on simple models of the human immune system. As noted by Stibor et al (2005), "first generation algorithms", including negative selection and clonal selection do not produce the same high quality performance as the human immune system. These algorithms, negative selection in particular, are prone to problems with scaling and the generation of excessive false alarms when used to solve problems such as network based intrusion detection.…”
Section: Introductionmentioning
confidence: 99%
“…By applying statical inference test we determine if an unseen instance is normal or abnormal. Normal instances occur in high probability regions of the statistical model while anomalies occur in a low probability regions of the stochastic model [18,52]. Spectral anomaly detection techniques try to find a lower dimensional subspace in which normal instances and anomalies appear significantly different.…”
Section: Current Anomaly Detection Techniquesmentioning
confidence: 99%
“…As the base for the change detection, the fitness distribution F(t), is real-valued it seems straightforward to use a real-valued shape space S =[0, 1] m here, where m is its dimension. Dimensionality of the shape space is an important parameter influencing computational effort and performance of the detection scheme (42). The dimensionality of the fitness distribution F(t) equals the number of individuals in the population µ.…”
Section: The Immunological Change Detectormentioning
confidence: 99%