A framework for evolving multi-shaped detectors in negative selection

被引:38
作者
Balachandran, Sankalp [1 ]
Dasgupta, Dipankar [1 ]
Nino, Fernando [2 ]
Garrett, Deon [1 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] Univ Nacl Colombia, Bogota, Colombia
来源
2007 IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTATIONAL INTELLIGENCE, VOLS 1 AND 2 | 2007年
关键词
evolutionary algorithms; artificial immune systems; negative selection; Monte Carlo estimation; computational geometry;
D O I
10.1109/FOCI.2007.371503
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a framework to generate multi-shaped detectors with valued negative selection algorithms (NSA). In particular, detectors can take the form of hyper-rectangles, hyper-spheres and hyper-ellipses in the non-self space. These novel pattern detectors (in the complement space) are evolved using a genetic search (the structured genetic algorithm), which uses hierarchical genomic structures and a gene activation mechanism to encode multiple detector shapes. This genetic search (the Structured GA) allows in maintaining diverse shapes while contributing to the proliferation of best suited detector shapes in expressed phenotype. The results showed that a significant coverage of the non-self space could be achieved with fewer detectors compared to other NSA approaches (using only single-shaped detectors). The uniform representation scheme and the evolutionary mechanism used in this work can serve as a baseline for further extension to use several shapes, providing an efficient coverage of non-self space.
引用
收藏
页码:401 / +
页数:2
相关论文
共 16 条
  • [1] [Anonymous], 1994, P 1994 IEEE S RES SE
  • [2] BLAKE CL, 1997, UCI REPOSITORY MACHI
  • [3] An immunity-based technique to characterize intrusions in computer networks
    Dasgupta, D
    González, F
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) : 281 - 291
  • [4] DASGUPTA D, 1993, IKBS1193
  • [5] An immunological approach to change detection: Algorithms, analysis and implications
    Dhaeseleer, P
    Forrest, S
    Helman, P
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 110 - 119
  • [6] Gonzalez FA, 2003, THESIS
  • [7] GONZALEZ LJ, 2004, P GEN EV COMP C GECC
  • [8] JI Z, 2004, P GEN EV COMP C GECC
  • [9] LIU JS, 2001, M CARLO STRATEGIES S
  • [10] MAHFOUD WS, 1995, 6 INT C GEN ALG MORG, P136