Information Technology Reference
In-Depth Information
In order to obtain representative results, we performed 50 simulation runs,
each with a randomly determined permutation mask for both data sets. Due
to the lack of space to present all 50 simulation runs, we have selected two
simulation results at random for each data set (see Fig. 5,6,7,8). The remaining
simulation results are closely comparable to results in figures (5,6,7,8).
6Conluon
Lymphocyte diversity is an important property of the immune system for recog-
nizing a huge amount of diverse substances. This property has been abstracted in
terms of permutation masks in the Hamming negative selection detection tech-
nique. In this paper we have shown that (randomly determined) permutation
masks in Hamming negative selection, distort the semantic meaning of the un-
derlying data — the shape of the distribution — and as a consequence shatter
self regions. Furthermore, the distorted data is transformed into a collection of
random chunks. Hence, detectors are not covering areas around the self regions,
instead they are randomly distributed across the space. Moreover the resulting
holes (the generalization) occur in regions where actually no self regions should
occur. Additionally we believe that it is computational infeasible to find permu-
tation masks which correctly capture the semantical representation of the data
— if one exists at all. We conclude that the use of permutation masks casts doubt
on the appropriateness of abstracting diversity in Hamming negative selection.
References
1. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in
a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security
and Privacy, IEEE Computer Society Press (1994)
2. Dasgupta, D., Forrest, S.: Novelty detection in time series data using ideas from
immunology. In: Proceedings of the 5th International Conference on Intelligent
Systems. (1996)
3. Hofmeyr, S.A.: An Immunological Model of Distributed Detection and its Appli-
cation to Computer Security. PhD thesis, University of New Mexico (1999)
4. Singh, S.: Anomaly detection using negative selection based on the r-contiguous
matching rule. In: Proceedings of the 1st International Conference on Artificial
Immune Systems (ICARIS), Unversity of Kent at Canterbury Printing Unit (2002)
99-106
5. Kim, J., Bentley, P.J.: An evaluating of negative selection in an artificial immune
system for network intrusion detection. In: Proceedings of the Genetic and Evolu-
tionary Computation Conference, GECCO-2001. (2001) 1330-1337
6. Stibor, T., Timmis, J., Eckert, C.: On the appropriateness of negative selection
defined over hamming shape-space as a network intrusion detection system. In:
Congress On Evolutionary Computation - CEC 2005, IEEE Press (2005) 995-1002
7. Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and
k-cnf satisfiability. In: Congress On Evolutionary Computation - CEC 2006, IEEE
Press (2006 (to appear))
Search WWH ::




Custom Search