Self-Adaptive Negative Selection Using Local Outlier Factor

Conference paper


Negative selection algorithm (NSA) classifies a given data either as normal (self) or anomalous (non-self). To make this classification, it is trained using normal (self) samples. NSA generates detectors to cover the complementary space of self in training phase. The classification of NSAs is mainly specified by two issues, self space determination and detectors coverage. The boundary of self is ambiguous so NSAs use self samples to calculate a space close to the self space. The other issue is the detectors coverage which should maximize non-self space coverage and minimize self space coverage. This paper introduces a novel NSA and this NSA proposes k-nearest neighbor and local outlier factor to determine self space for a given self samples. Beside these, it specifies the detectors coverage using Monte Carlo Integration. The experimental evaluations show that the novel NSA generates comparable and reasonable results.


  1. 1.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Research in Security and Privacy, pp. 202–212 (1994)Google Scholar
  2. 2.
    Al-Enezi, J., Abbod, M., Alsharhan, S.: Artifical immune systems—models, algorithms and application. Int. J. Res. Rev. Appl. Sci. 3(2), 118–131 (2010)Google Scholar
  3. 3.
    Dasgupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 6(3), 1081–1088 (2002)Google Scholar
  4. 4.
    Balachandran, S., Dasgupta, D., Nino, F., Garrett, D.: A framework for evolving multi-shaped detectors in negative selection. In: IEEE Symposium on Foundations of Computational Intelligence, pp. 401–408 (2007)Google Scholar
  5. 5.
    Zeng, J., Liu, X., Li, T., Liu, C., Peng, L., Sun, F.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19, 261–266 (2009)Google Scholar
  6. 6.
    Yuel, X., Zhang, F., Xi, L., Wang, D.: Optimization of self set and detector generation base on real-value negative selection algorithm. Int. Conf. Comput. Comm. Technol. Agric. Eng. 2, 12–15 (2010)Google Scholar
  7. 7.
    Ji, Z.: A boundary-aware negative selection algorithm. In: Proceedings of IASTED International Conference of Artificial Intelligence and Soft Computing, pp. 379–384 (2005)Google Scholar
  8. 8.
    Ji, Z., Dasgupta, D.: V-detector: An efficient negative selection algorithm with “probably adequate” detector coverage. Inform. Sci. 179(10), 1390–1406 (2009)CrossRefGoogle Scholar
  9. 9.
    Gonzalez, F., Dasgupta, D., Nino, L.F.: A randomized real-valued negative selection algorithm. In: Proceedings of the 2nd International Conference on Artificial Immune Systems, pp. 261–272 (2003)Google Scholar
  10. 10.
    Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: Lof: Identifying density-based local outliers. In: ACM SIGMOD 2000 International Conference on Management of Data, pp. 93–104 (2000)Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Department of Computer EngineeringMiddle East Technical UniversityAnkaraTurkey

Personalised recommendations