Temporal Anomaly Detection: An Artificial Immune Approach Based on T Cell Activation, Clonal Size Regulation and Homeostasis
This paper presents an artificial immune system (AIS) based on Grossman’s tunable activation threshold (TAT) for temporal anomaly detection. We describe the generic AIS framework and the TAT model adopted for simulating T Cells behaviour, emphasizing two novel important features: the temporal dynamic adjustment of T Cells clonal size and its associated homeostasis mechanism. We also present some promising results obtained with artificially generated data sets, aiming to test the appropriateness of using TAT in dynamic changing environments, to distinguish new unseen patterns as part of what should be detected as normal or as anomalous. We conclude by discussing results obtained thus far with artificially generated data sets.
KeywordsArtificial immune systems Pattern recognition Anomaly detection Homeostasis
The authors acknowledge the facilities provided by the CRACS research unit, an INESC associate of the Faculty of Science, University of Porto.
- 1.Antunes M, Correia E (2008) TAT-NIDS: an immune-based anomaly detection architecture for network intrusion detection, Proceedings of IWPACBB’08 – Advances in Soft Computing (Springer), pp 60–67Google Scholar
- 2.Antunes M, Correia E, Carneiro J (2009) Towards an immune-inspired temporal anomaly detection algorithm based on tunable activation thresholds, Proceedings of International Conference of Bioinspired systems and signal processing (BIOSIGNALS), pp 357–362Google Scholar
- 3.Antunes M, Correia E (2009) An Artificial Immune System for Temporal Anomaly Detection Using Cell Activation Thresholds and Clonal Size Regulation with Homeostasis, Proceedings of International Joint Conferences on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS), pp 323–326Google Scholar
- 4.Burmester G, Pezzuto A (2003) Color Atlas of Immunology. Thieme Medical Publishers, George Thieme VerlagGoogle Scholar
- 5.Burnet F (1959) The Clonal Selection Theory of Acquired Immunity, Vanderbilt University Press Nashville, TennesseGoogle Scholar
- 7.Castro L, Timmis J (2002) Artificial Immune Systems: A New Computational Intelligence Approach. Springer, New YorkGoogle Scholar
- 9.Kim J, Bentley P (2001) An evaluation of negative selection in an artificial immune system for network intrusion detection, Proceedings of Genetic and Evolutionary Computation Conference (GECCO), 1330–1337Google Scholar
- 11.Matzinger P (2002) The danger model: a renewed sense of self, Science’s STKE 296(5566):301–305Google Scholar
- 12.Pedroso J (2007) Simple Metaheuristics Using the Simplex Algorithm for Non-linear Programming, Engineering Stochastic Local Search Algorithms. Designing, Implementing and Analyzing Effective Heuristics – LNCS (Springer), 4638:217–221Google Scholar
- 13.Stibor T, Timmis J and Eckert C (2005) On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system, Proceedings of IEEE congress on Evolutionary Computation (CEC) 2:995–1002Google Scholar