Static Clonal Selection Algorithm Based on Match Range Model

  • Jungan Chen
  • Dongyong Yang
  • Feng Liang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4031)


Static Clonal Selection Algorithm (SCSA) is proposed to generate detectors to intrusion detection. A gene expression is used to express detector which exists as a form of classification rules. But full match rule is used and the gene expression can not express classification rules with OR operator freely. In this work, by combined the gene expression with partial match rule which is an important component in negative selection algorithm, a new expression which can express classification rules with OR operator is proposed. But the match threshold in match rule is difficult to set. Inspired from the T-cell maturation, a match range model is proposed. Base on this model and new expression proposed, a Static Clonal Selection Algorithm based on Match Range Model is proposed. The proposed algorithm is tested by simulation experiment for self/nonself discrimination. The results show that the proposed algorithm is more effective to generate detector with partial classification rules than SCSA which generates detector with full conjunctive rules with ‘and’; match range is self-adapted.


Intrusion Detection Classification Rule Artificial Immune System Human Immune System Match Rule 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kim, J.W.: Integrating Artificial Immune Algorithms for Intrusion Detection, PhD Thesis, Department of Computer Science, University College London (2002)Google Scholar
  2. 2.
    De Jong, K.A., Spears, W.M., Gordon, D.F.: Using Genetic Algorithms for Concept Learning. In: Machine Learning, pp. 161–188 (1993)Google Scholar
  3. 3.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos (1994)Google Scholar
  4. 4.
    Hofmeyr, S.A.: An Immunological Model of Distributed Detection and its Application to Computer Security, PhD Dissertation, University of New Mexico (1999)Google Scholar
  5. 5.
    Gonzalez, F.: A Study of Artificial Immune Systems applied to Anomaly Detection, A Dissertation presented for the Doctor of Philosophy Degree, The University of Memphis (2003)Google Scholar
  6. 6.
    de Castro, L.N., Von Zuben, F.J.: Artificial Immune Systems: Part I – Basic Theory and Applications, Technical Report – RT DCA 01/99 (1999)Google Scholar
  7. 7.
    de Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems, 239–251 (2002)Google Scholar
  8. 8.
    Wenjian, L.: Research on Artificial Immune Model and Algorithms Applied to Intrusion Detection, PhD Dissertation, University of Science and Technology of China (2003)Google Scholar
  9. 9.
    Forrest, S., Javornik, B., Smith, R.E., Perelson, A.S.: Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation, 191–211 (1993)Google Scholar
  10. 10.
    Dougherty, J., Kohavi, R., Sahami, M.: Supervised and unsupervised discretization of continuous features. Available:
  11. 11.
    D’haeseleer, P., Forrest, S., Helman, P.: A Distributed Approach to Anomaly Detection (1997), Available:

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jungan Chen
    • 1
  • Dongyong Yang
    • 2
  • Feng Liang
    • 1
  1. 1.Zhejiang Wanli UniversityNingbo, ZhejiangChina
  2. 2.Zhejiang University of TechnologyHangzhou, ZhejiangChina

Personalised recommendations