Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)
DOI: 10.1109/cec.2002.1007012
|View full text |Cite
|
Sign up to set email alerts
|

Combining negative selection and classification techniques for anomaly detection

Abstract: This paper presents a novel approach inspired by the immune system that allows the application of conventional classification algorithms to perform anomaly detection. This approach appears to be very useful where only positive samples are available to train an anomaly detection system. The proposed approach uses the positive samples to generate negative samples that are used as training data for a classification algorithm. In particular, the algorithm produces fuzzy characterization of the normal (or abnormal)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
99
0
1

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 138 publications
(100 citation statements)
references
References 7 publications
0
99
0
1
Order By: Relevance
“…The real-valued negative selection algorithm (RNSA) was first proposed in 2002 [5]. In this algorithm, data (including both training and testing data), detectors, affinity (or performance metrics), and the matching threshold are both represented by real-valued data in an n-dimensional real vector space.…”
Section: The Real-valued Negative Selection Algorithmsmentioning
confidence: 99%
“…The real-valued negative selection algorithm (RNSA) was first proposed in 2002 [5]. In this algorithm, data (including both training and testing data), detectors, affinity (or performance metrics), and the matching threshold are both represented by real-valued data in an n-dimensional real vector space.…”
Section: The Real-valued Negative Selection Algorithmsmentioning
confidence: 99%
“…In the original version of the NS algorithm [8], the detectors are used directly to classify new data as self (normal) or non-self (abnormal). Subsequent works have shown the feasibility of combining the NS algorithm with classification algorithms [11]; in this case, the generated detectors are used by the classification algorithm to learn high-level anomaly detection functions. Regardless of how the detectors are used, a good coverage of the non-self space is important for the anomaly detection process.…”
Section: Introductionmentioning
confidence: 99%
“…González et al [11] proposed a Real-Valued Negative Selection (RNS) algorithm based on heuristics that try to distribute the detectors in the non-self space in order to maximize the coverage. This algorithm uses a real-valued representation for the self/non-self space that differs from the binary representation used in original negative selection algorithms [5,8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations