Adaptive Hybrid Immune Detector Maturation Algorithm

  • Jungan Chen
  • Wenxin Chen
  • Feng Liang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6077)


In this work, a novel Adaptive Hybrid Immune Detector Maturation Algorithm is proposed for anomaly detection. T-detector Maturation Algorithm and Dynamic Negative Selection Algorithm are combined with a new state transformation model. Experiment results show that the proposed algorithm solves the population-adapt problem and can generate detectors with higher affinity.


artificial immune system anomaly detection adapt problem 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (1994)Google Scholar
  2. 2.
    de Castro, L.N., Von Zuben, F.J.: aiNet: An Artificial Immune Network for Data Analysis. In: Abbass, H.A., Sarker, R.A., Newton, C.S. (eds.) Data Mining: A Heuristic Approach, ch. XII, pp. 231–259. Idea Group Publishing, USA (2001)Google Scholar
  3. 3.
    de Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems (2002)Google Scholar
  4. 4.
    Chen, T.-C., Chen, C.-Y.: Satellite-Derived Land-Cover Classification Using Immune Based Mining Approach. In: 5th WSEAS International Conference on Applied Computer Science (2006)Google Scholar
  5. 5.
    Kim, J.W.: Integrating Artificial Immune Algorithms for Intrusion Detection, PhD Thesis, Department of Computer Science, University College London (2002)Google Scholar
  6. 6.
    Huang, T.L., Lee, K.T., Chang, C.H., Hwang, T.Y.: Two-Level Sliding Mode Controller Using Artificial Immue Algorithm. WSEAS Transcations on Power Systems (2006)Google Scholar
  7. 7.
    Hofmeyr, S.A.: An Immunological Model of Distributed Detection and its Application to Computer Security, PhD Dissertation, University of New Mexico (1999)Google Scholar
  8. 8.
    Gonzalez, F.: A Study of Artificial Immune Systems applied to Anomaly Detection, PhD Dissertation, The University of Memphis (May 2003)Google Scholar
  9. 9.
    Ji, Z., Dasgupta, D.: Revisiting Negative Selection Algorithms. Evolutionary Computation (2007)Google Scholar
  10. 10.
    Yang, D., Chen, J.: The T-Detectors Maturation Algorithm Based on Genetic Algorithm, LNCS. Springer, Heidelberg (2004)Google Scholar
  11. 11.
    Yang, D., Chen, J.: The T-detectors maturation algorithm based on match range model. In: Proceedings of the 2005 ACM Symposium on Applied Computing (2005)Google Scholar
  12. 12.
    Chen, J.: T-detectors Maturation Algorithm with Min- Match Range Model. In: The 3rd IEEE International Conference on Intelligent System (2006)Google Scholar
  13. 13.
    Wenjian, L.: Research on Artificial Immune Model and Algorithms Applied to Intrusion Detection, PhD Dissertation, University of Science and Technology of China (2003)Google Scholar
  14. 14.
    Chen, J.: Dynamic Negative Selection Algorithm Based on Match Range Model, LNCS. Springer, Heidelberg (2005)Google Scholar
  15. 15.
  16. 16.
    Dougherty, J., Kohavi, R., Sahami, M.: Supervised and unsupervised discretization of continuous features,

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jungan Chen
    • 1
  • Wenxin Chen
    • 1
  • Feng Liang
    • 1
  1. 1.Electronic Information DepartmentZhejiang Wanli UniversityZhejiangChina

Personalised recommendations