Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)
DOI: 10.1109/cec.2002.1004386
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in multidimensional data using negative selection algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(29 citation statements)
references
References 3 publications
0
29
0
Order By: Relevance
“…Ideally, the use of this affinity function (or any other affinity function) should be justified taken into account the data being mined, but this is not usually the case in the literature. The r-contiguous bits rule or its variants are often used without any specific justification for this choice [3], [4], [19]. When a justification is presented, it is usually the fact that this rule is more biologically plausible than the Hamming distance [9], [5] (p. 70).…”
Section: Affinity Functions For Binary Antibody/antigen Representationmentioning
confidence: 99%
See 1 more Smart Citation
“…Ideally, the use of this affinity function (or any other affinity function) should be justified taken into account the data being mined, but this is not usually the case in the literature. The r-contiguous bits rule or its variants are often used without any specific justification for this choice [3], [4], [19]. When a justification is presented, it is usually the fact that this rule is more biologically plausible than the Hamming distance [9], [5] (p. 70).…”
Section: Affinity Functions For Binary Antibody/antigen Representationmentioning
confidence: 99%
“…In some cases, the approach of "adapting" the data to the algorithm will even throw away some potentially relevant data just because the algorithm cannot handle that data. For instance, [4] apply a negative selection algorithm to a multidimensional personnel data containing both categorical and numeric data. However, instead of using a hybrid categorical/numeric representation and take all the attributes into account, they simply ignore categorical attributes and work only with numeric attributes.…”
Section: Issues In the Choice Of Antibody/antigen Representationmentioning
confidence: 99%
“…Neural network one-class classification helps to reveal anomalies among typical patterns. This approach leads us to online analysis of multidimensional data [9][10][11] and it's known to be used not only for network anomaly detection [12]. It postulates that anomaly is just a novelty.…”
Section: Introductionmentioning
confidence: 99%
“…This emerging field of research is known as Artificial Immune System (AIS) [11]. Based on the different immune theories, various algorithms such as Danger Theory (DT) models [2], [3], Negative Selection Algorithms [5], [17], Immune Network Theory-based model [15], Clonal Selection Algorithms (CSA) [12], [18] are proposed and also applied on patter recognition [9],intrusion detection [10], [21], optimization problems [1], [14] and so on.…”
Section: Introductionmentioning
confidence: 99%