SlideShare a Scribd company logo
1 of 50
Download to read offline
Professor, Department of Computer Science
Role of Biological Immune
                     System (BIS)
• Its primary role is to distinguish the host (body
  cells) from external entities (pathogens).
• When an entity is recognized as non-self (or
  dangerous) - activates several defense
  mechanisms leading to its destruction (or
  neutralization).
• Subsequent exposure to similar entity results in
  rapid immune response (Secondary Response).
• Overall behavior of the immune system is an
  emergent property of many local interactions.
D. Dasgupta                                       2
An abstract view of BIS:




  D. Dasgupta              3
Multi-Level Detection




D. Dasgupta                           4
From the computational point of
     view, the immune system is a
  • Distributed information processing system
  • Novel pattern recognizer: Self/non-self
    (Danger) Discrimination
  • Multi-level Self regulated Defense System
  • Having unique mechanisms for
       –      Decentralized control
       –      Signaling and Message-passing
       –      Co-stimulation
       –      Learning and memory
       –      Diversity
D. Dasgupta                                   5
Computational Models & Algorithms
•   Immune Network Models ( Jerne’74)
•   Negative Selection Algorithms (Forrest’94)
•   Immune Gene Libraries (Hightower’90)
•   Associative Memory (Gilbert’94, Smith’96)
•   Artificial Immune Systems (Hunt’95, Timmis’97)
•   Immune Agent Architecture (Mori’98, Dasgupta’99)
•   Artificial Germinal Centers (Dasgupta’ 02)
•   Other Models (Farmer’86, Bersini’90,Varela,’91,
    etc.)
    D. Dasgupta                                  6
Artificial Immune Systems (AIS)
 Immunological        Computational        Typical Applications
                        Problem
    Aspect
Self/non-self       Anomaly or change      -   Computer security
recognition (NSA)   detection              -   Fault detection
Immune Networks     Learning (supervised   -   Classification
                    and unsupervised)      -   Clustering
(AINE,RLAIS,AIRS,
                                           -   Data analysis
FuzzyAIS)
                                           -   Stream data-mining
Clonal selection    Search, optimization   -   Function optimization
(Clonalg, aiNet)
Cell Mobility       Distributed            - SecAgent architectures
(ImmAg)             processing             - Decentralized robot
                                           control
   D. Dasgupta                                                   7
Negative Selection Algorithm (NSA)
                                           ( Forrest ‘94)
An algorithm for change detection based on
the principles of self-nonself discrimination
(by T Cell receptors) in the immune system.
The receptors can detect antigens.
                                      Partition of the Universe
                                             of Antigens

                                   SNS:
                                    self and nonself (a and b)
Illustration of NS Algorithm:
                                                              Match   Don’t Match
                        Self                      r=2
                                                              1011       1011
                    strings (S)
                                                              1000       1101

   Generate
                                       Detector
                      Match
random strings
                                       Set (R)
                                  No
     (R0)
                          Yes


                     Reject




     For binary representation:
    • There exists efficient BNS algorithm that runs on linear
      time with the size of self (D’haeseleer’96).
            – Efficient algorithm to count number of holes.
            – Theoretical analysis based on Information Theory.
      D. Dasgupta                                                           9
Defining the Negative Selection
                 Algorithm (NSA) :
• Define Self as a normal pattern of activity or stable
  behavior of a system/process
   – A collection of logically split segments (equal-size) of pattern
     sequence.
   – Represent the collection as a multiset S of strings of length l
     over a finite alphabet.
• Generate a set R of detectors, each of which fails to
  match any string in S.
• Monitor new observations (of S) for changes by
  continually testing the detectors matching against
  representatives of S. If any detector ever matches, a
  change ( or deviation) must have occurred in system
  behavior.
   D. Dasgupta                                                   10
NS Greedy Algorithm: (D’haeseleer’96)
 It can generate a diverse set of detectors to
 provide better coverage in the non-self space.
 Particularly, instead of generating detectors
 randomly (in the second phase), the greedy
 algorithm chooses detectors that are far apart,
 in order to avoid possible overlapping of
 detectors and to provide enough coverage in
 the non-self space.
Partial Matching Rule
         (r-contiguous symbols)
               X:     ABCBBCDEABCE
             Y:      BCCBCCAEABAE
       Choose a threshold (r):
                                        r≤3
          match (X, Y) = T
       PM ≅ m-r [(l - r) (m-1) / m + 1]
       m = size of alphabet
       l = num of symbols in string
        e.g.: strings of length l=30, matching length r=8
                     010101001001110010001111110100
                     111010101101110010100010011110
D. Dasgupta                                                 12
Anomaly Detection in Time Series
•   Dasgupta & Forrest (1996) on time series data, based on the previously
    discussed negative-selection algorithm.




    D. Dasgupta                                                      13
Anomaly Detection Process
Analyzing the Expressiveness of
     Binary Matching Rules
• 2-dimensional Euclidean
  problem space
• NS with binary rules is
  applied
• The generated detectors
  are mapped back to the
  problem space
• Self set: a section of
  Mackey-Glass data set


D. Dasgupta                    15
Problem Space Representation




D. Dasgupta                        16
Generated Coverings
                                    10010100
              10010100   10010100
                                    11010110
              11010110   **0101**
                                    1+0+1+1+1+1+0+1=6
                                      Hamming
                         r-chunk
          r-contiguous
 Binary
 Gray




                r=9       r=8            r = 12
D. Dasgupta                                             17
Shape of Binary Matching Rules
                                                    1100001010100011
              1100001010100011   1001000010001000   1000000010000000
              1000000010000000   ****00001000****   1 1111 111 111 = 11

                                                       Hamming
              r-contiguous          r-chunk
 Binary
 Gray




                   r=4                r=8                 r=8
D. Dasgupta                                                               18
Coverings Generated by
               Different Values of r

   r=6             r=7      r=8        r=9




D. Dasgupta                                  19
Limitations of BMRs in NSA
  Binary matching rules are not able to capture the
  semantics of some complex self/non-self spaces.
  It is not easy to extract meaningful domain
  knowledge.
  Scalability issues: In some cases, large number of
  detectors are needed to guarantee a good level of
  detection.
  It is difficult to integrate the NS algorithm with
  other immune algorithms.
  Crisp boundary of self and non-self may be hard to
  define

D. Dasgupta                                        20
Advances in NSA:
                             Developments in NSA


                              New detector gene-         Non-crisp self/non-self
     New
representation                ration algorithms               distinction




                                                                    Hybrid Immune
                                                                    Learning
                                                                    Algorithm


     Hyper-rectangles          Fuzzy If-Then       Hyper-spheres
                                   rules
     Crisp If-Then rules



      NSDR:
                                                      RNS
                                  NSFDR
      - Seq Niching
                                                      RRNS
      - Det. Crowding

D. Dasgupta                                                                 21
                                  Multi-shaped
Real-Valued Self/Non-self Space
Use of a multi-dimensional real
  representation of the space:
   – Appropriate for diverse
     applications
   – Some geometrical properties X1
     of Rn that may speed up the      Non_Self
     negative selection
   – It is easier to map the                     Self

     detectors back to the problem
                                         Self
     space
   – Other AIS approaches use                                X
     this kind of representation
   D. Dasgupta                                          22
Evolving Fault detectors
  •   Goal: to evolve 'good' fault indicators (detectors) in
      the non-self (abnormal) space.
  •   'good' detector means:
       – It must not cover self.
       – It has to be as general as possible: the larger the
         volume, the better.
       – Collectively provide maximum coverage of the non-
         self space with minimum overlap
  •   Some detectors serve as specialized (signature for
      known fault conditions) and others are for probable
      (or possible) faulty conditions.


D. Dasgupta                                                    23
RNS Algorithm: Flow Diagram




D. Dasgupta                   24
NS Rule Evolution:
     Different Levels of Deviation
• Define different
  levels of variability   Normal


  on the self set.
                                      Normal

• Evolve detectors for
  the different levels.

                                      Normal

                                      Level 1
                                   Level 2

D. Dasgupta                                     25
A Heuristic Algorithm for
       Generating Hyper-spherical
           Detectors (RNS)
Self Data

              Generate random
                                Optimize detector
               population of
                                  distribution
                 detectors




D. Dasgupta                                         26
Generation of Detector using
            Genetic Algorithm
Self Data

                                              Replace closest
                 Generate       Choose
                  Initial     two parents     parent if fitness
                population   and cross them      is better.




  D. Dasgupta                                                     27
Multi-shaped detectors




D. Dasgupta                            28
Anomaly Detection Function
     µself :             Rn              Range
                                     Abnormal

                                                 Crisp
                                      Normal
        X1                           Abnormal
              Non_Self
                                                Non-crisp
                         Self
                                                discrete
                Self
                                      Normal
                                X0

                                     Abnormal

                                                Fuzzy
                                      Normal


D. Dasgupta                                              29
Immunity Based Fault Detection




                                                F1
                       Non_Self
                       F4


                                        Self
                                  F2
                         Self
                                                F3

D. Dasgupta                                      30
                                       Concept Illustration
D. Dasgupta   32
Fault    Activated   Detection     False Alarm (mean)   False
Type     Detectors   Rate (mean)                        Alarm (std)


Left         10         97.8 %           0.15 %           0.33%
Engine


Tail 3        9         94.7 %           0.76 %           0.26%


Tail 1        7         91.8 %           1.04%            0.47%



Wing 3        3         95.6 %           0.43%            0.36%
Testing of two different faults (Tail
           and wing failure)
                   Type of Fault          Tail   Wing
              # of activated detectors     82    108
               Detection rate (mean)      89%     92%
                Detection rate (Std)      1.43    1.67
                False Alarm (mean)       0.87%   0.98%
                 False Alarm (Std)        0.45    0.32




D. Dasgupta                                              34
Variable size Fault Detectors




D. Dasgupta                           35
Combining Negative Selection (NS) and
 Classification Techniques for Anomaly
        Detection (Gonzalez’02)
    • The idea is to combine conventional classification
      algorithms and Artificial Immune Systems
      techniques to perform anomaly detection.
       –  In many anomaly detection applications, only positive
         (normal) samples are available at the training stage.
       – Conventional classification algorithms need positive and
         negative samples.
       – The proposed approach uses the positive (normal)
         samples to generate negative samples that are used as
         training data for a neural network.
 D. Dasgupta                                                 36
Generating Classifier dataset




D. Dasgupta                            37
Advantages of Negative Selection
• From an information theory point of view,
  characterization of the normal space is equivalent to
  the characterization of the abnormal space.
• Distributed detection: Different set of detectors can
  be distributed at different location
• Other possibilities
    –   Generalized and specialized detectors
    –   Dynamic detector sets
    –   Detectors with specific features
    –   Artificial Fault signatures
    –   Data samples for classification techniques
 D. Dasgupta                                         38
Multilevel
 Immune
     Learning
       Algorithm
D. Dasgupta        39
MILA Algorithm
D. Dasgupta                    40

                 Overview
MILA Algorithm Implementation: Basic Strategies


 Shape-space model:
  e.g., Ag or Ab is represented as m = < m1, m2
    …, mL>

 Euclidean distance:
  calculate the degree of Ag-Ab interaction.

 Partial matching rule:
              Ag
                   match
              Ab
D. Dasgupta                                     41
Algorithm Implementation: Basic Strategies

        APC recognition: default
        Th recognition: low-level
        Ts recognition: suppression
        B recognition: high-level
        Cloning and mutation
         o targeted (not blind) cloning
         o positive selection (higher affinity)   and
           negative selection (self tolerant)
D. Dasgupta                                         42
Low Level Th recognition


   a1,    a2,    a3,     a4,   a 5,   a6,   a7,   a8,   a9,   a10,   … ad

     Peptide length = k = 4




D. Dasgupta                                                                 43
High Level B recognition   go back




                             1, m1   3, m2   L, mL
                         B


                        a1      a2                        aL
                   Ag
D. Dasgupta                                          44
                        1       3                         L
Mysterious Cell---- Ts cell
Ts exactly exists in body and suppresses
immune response! Ts has specificity for
special antigen.
Mechanism remains unknown
For the problem of anomaly detection, Ts
detector is regarded as a special self-detecting
agent.
  Initialization phase: Ts detector will be selected if it
  still matches the self-antigen under more stringent
  threshold.
    Recognition phase: the response will be terminated
    when Ts detector matches a special antigen
    resembling self-data pattern.
D. Dasgupta                                        45
Dynamic detector sets

Normal Sample                       Testing Sample


                                                          ROC 5

                                                                  5
                     ROC 1
                                                        ROC 4
                                           ROC 3
                                 ROC 2
                 1
                                                            4
                             2              3

                                 Dynamic Detector set
   D. Dasgupta                                                    46
New Features of MILA
    Combines       several     immunological
    metaphors instead of implementing in a
    piecemeal manner.
    Uses multiple strategies for detection to
    make the system either very sensitive to
    any changes or robust to noise.
    Detector    generation      is    problem
    dependent: different threshold parameters
    are   available   tuning     the   system
    performance
D. Dasgupta                                47
New Features of MILA (Cont..)
   Detector set in MILA is dynamic whereas
   detector set in Negative Selection Algorithm
   remains constant once it is generated in
   training phase.
        The cloning, mutation and selection after detect
        phase in MILA is actually a process of on-line
        learning and optimization.
        The process of cloning in MILA is a targeted (not
        blind) cloning. Only those detectors that are
        activated in recognition phase can be cloned.
        This strategy ensures that both the speed and
        accuracy of detection becomes successively
        higher after each detecting.
D. Dasgupta                                          48
Summary
•     AIS emerged in 1990s as a new paradigm in AI, and
      has earned its position on the map of soft computing
•     Being used in many applications – anomaly detection,
      pattern recognition, data mining, computer security,
      adaptive control, fault detection
•     The long-term usefulness of AIS methods still depend
      on
     – Uniqueness
     – Effectiveness

          We need unified AIS architecture and/or algorithm
D. Dasgupta                                                   49
For Information on
Artificial Immune System
      Related Events
            and
       Bibliography
             Visit the website
http://www.cs.memphis.edu/~dasgupta/AIS/
        The University of Memphis

More Related Content

What's hot

Katherine 80010606 v01
Katherine 80010606 v01Katherine 80010606 v01
Katherine 80010606 v01Azam Khan
 
MasersPresentation (1).ppt
MasersPresentation (1).pptMasersPresentation (1).ppt
MasersPresentation (1).pptRavinabishnoi11
 
Smart antenna
Smart antennaSmart antenna
Smart antennatsid19
 
219272664 s-parameters
219272664 s-parameters219272664 s-parameters
219272664 s-parametersManish Arora
 
Principle of FMCW radar
Principle of FMCW radarPrinciple of FMCW radar
Principle of FMCW radartobiasotto
 
Millimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphonesMillimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphonesPei-Che Chang
 
Handoff management
Handoff managementHandoff management
Handoff managementMounika Uade
 
Artificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antennaArtificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antennaRaj Kumar Thenua
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Millimeter wave as the future of 5g
Millimeter wave as the future of 5g Millimeter wave as the future of 5g
Millimeter wave as the future of 5g Saurabh Verma
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Sahana B S
 
Nmea Introduction
Nmea IntroductionNmea Introduction
Nmea IntroductionTom Chen
 
Digital class
Digital classDigital class
Digital classxyxz
 
Prioritizing handoffs
Prioritizing handoffsPrioritizing handoffs
Prioritizing handoffsAJAL A J
 
DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE
    DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE    DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE
DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATEPrateek Kumar
 

What's hot (20)

Katherine 80010606 v01
Katherine 80010606 v01Katherine 80010606 v01
Katherine 80010606 v01
 
MasersPresentation (1).ppt
MasersPresentation (1).pptMasersPresentation (1).ppt
MasersPresentation (1).ppt
 
Smart antenna
Smart antennaSmart antenna
Smart antenna
 
219272664 s-parameters
219272664 s-parameters219272664 s-parameters
219272664 s-parameters
 
Principle of FMCW radar
Principle of FMCW radarPrinciple of FMCW radar
Principle of FMCW radar
 
Millimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphonesMillimeter wave 5G antennas for smartphones
Millimeter wave 5G antennas for smartphones
 
Handoff management
Handoff managementHandoff management
Handoff management
 
Artificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antennaArtificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antenna
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Millimeter wave as the future of 5g
Millimeter wave as the future of 5g Millimeter wave as the future of 5g
Millimeter wave as the future of 5g
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Smart Antenna
Smart AntennaSmart Antenna
Smart Antenna
 
Nmea Introduction
Nmea IntroductionNmea Introduction
Nmea Introduction
 
Digital class
Digital classDigital class
Digital class
 
Prioritizing handoffs
Prioritizing handoffsPrioritizing handoffs
Prioritizing handoffs
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
GMM
GMMGMM
GMM
 
Smart antenna
Smart antennaSmart antenna
Smart antenna
 
DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE
    DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE    DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE
DESIGN OF RECTANGULAR PATCH ANTEENA USING METAMATERIAL SUBSTRATE
 

Viewers also liked

Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsJulie Greensmith
 
2001: An Introduction to Artificial Immune Systems
2001: An Introduction to Artificial Immune Systems2001: An Introduction to Artificial Immune Systems
2001: An Introduction to Artificial Immune SystemsLeandro de Castro
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Kent State University
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attackUltraUploader
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune SystemsLeandro de Castro
 
Artificial immune system
Artificial immune systemArtificial immune system
Artificial immune systemTejaswini Jitta
 
2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune SystemsLeandro de Castro
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?Leandro de Castro
 
Real time detection system of driver distraction.pdf
Real time detection system of driver distraction.pdfReal time detection system of driver distraction.pdf
Real time detection system of driver distraction.pdfReena_Jadhav
 
Lecture8 multi class_svm
Lecture8 multi class_svmLecture8 multi class_svm
Lecture8 multi class_svmStéphane Canu
 
Modified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemModified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemIAEME Publication
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection khawla Osama
 
Bee algorithm
Bee algorithmBee algorithm
Bee algorithmkousick
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...ranjit banshpal
 
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEMAUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEMAnamika Vinod
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSKrishna Moparthi
 
Algorithms and Flowcharts
Algorithms and FlowchartsAlgorithms and Flowcharts
Algorithms and FlowchartsDeva Singh
 

Viewers also liked (20)

Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
 
2001: An Introduction to Artificial Immune Systems
2001: An Introduction to Artificial Immune Systems2001: An Introduction to Artificial Immune Systems
2001: An Introduction to Artificial Immune Systems
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems
 
Artificial immune system
Artificial immune systemArtificial immune system
Artificial immune system
 
2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
 
Real time detection system of driver distraction.pdf
Real time detection system of driver distraction.pdfReal time detection system of driver distraction.pdf
Real time detection system of driver distraction.pdf
 
Lecture8 multi class_svm
Lecture8 multi class_svmLecture8 multi class_svm
Lecture8 multi class_svm
 
Modified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemModified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problem
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
 
AIS
AISAIS
AIS
 
TabuSearch FINAL
TabuSearch  FINALTabuSearch  FINAL
TabuSearch FINAL
 
Bee algorithm
Bee algorithmBee algorithm
Bee algorithm
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEMAUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
 
Algorithms and Flowcharts
Algorithms and FlowchartsAlgorithms and Flowcharts
Algorithms and Flowcharts
 

Similar to Negative Selection for Algorithm for Anomaly Detection

Probablistic Inference With Limited Information
Probablistic Inference With Limited InformationProbablistic Inference With Limited Information
Probablistic Inference With Limited InformationChuka Okoye
 
General pipeline of transcriptomics analysis
General pipeline of transcriptomics analysisGeneral pipeline of transcriptomics analysis
General pipeline of transcriptomics analysisSanty Marques-Ladeira
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection철 김
 
Lecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksLecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksSang Jun Lee
 
Gene Expression Data Analysis
Gene Expression Data AnalysisGene Expression Data Analysis
Gene Expression Data AnalysisJhoirene Clemente
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automataijait
 
Distributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and RelatedDistributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and RelatedPei-Che Chang
 
Deep learning from a novice perspective
Deep learning from a novice perspectiveDeep learning from a novice perspective
Deep learning from a novice perspectiveAnirban Santara
 
Hierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionHierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionIhor Bobak
 
Gene Extrapolation Models for Toxicogenomic Data
Gene Extrapolation Models for Toxicogenomic DataGene Extrapolation Models for Toxicogenomic Data
Gene Extrapolation Models for Toxicogenomic DataNacho Caballero
 
Oriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRI
Oriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRIOriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRI
Oriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRILeonid Zhukov
 
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...Md Kafiul Islam
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...IJECEIAES
 
Bias correction, and other uncertainty management techniques
Bias correction, and other uncertainty management techniquesBias correction, and other uncertainty management techniques
Bias correction, and other uncertainty management techniquesOlivier Teytaud
 
Uncertainties in large scale power systems
Uncertainties in large scale power systemsUncertainties in large scale power systems
Uncertainties in large scale power systemsOlivier Teytaud
 
Adaptive equalization
Adaptive equalizationAdaptive equalization
Adaptive equalizationKamal Bhatt
 
20141003.journal club
20141003.journal club20141003.journal club
20141003.journal clubHayaru SHOUNO
 

Similar to Negative Selection for Algorithm for Anomaly Detection (20)

Ijetr042309
Ijetr042309Ijetr042309
Ijetr042309
 
Microarray Analysis
Microarray AnalysisMicroarray Analysis
Microarray Analysis
 
Probablistic Inference With Limited Information
Probablistic Inference With Limited InformationProbablistic Inference With Limited Information
Probablistic Inference With Limited Information
 
General pipeline of transcriptomics analysis
General pipeline of transcriptomics analysisGeneral pipeline of transcriptomics analysis
General pipeline of transcriptomics analysis
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
Lecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksLecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural Networks
 
Gene Expression Data Analysis
Gene Expression Data AnalysisGene Expression Data Analysis
Gene Expression Data Analysis
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
 
Distributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and RelatedDistributed Architecture of Subspace Clustering and Related
Distributed Architecture of Subspace Clustering and Related
 
Deep learning from a novice perspective
Deep learning from a novice perspectiveDeep learning from a novice perspective
Deep learning from a novice perspective
 
Hierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionHierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly Detection
 
Compressed Sensing In Spectral Imaging
Compressed Sensing In Spectral Imaging  Compressed Sensing In Spectral Imaging
Compressed Sensing In Spectral Imaging
 
Gene Extrapolation Models for Toxicogenomic Data
Gene Extrapolation Models for Toxicogenomic DataGene Extrapolation Models for Toxicogenomic Data
Gene Extrapolation Models for Toxicogenomic Data
 
Oriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRI
Oriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRIOriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRI
Oriented Tensor Reconstruction. Tracing Neural Pathways from DT-MRI
 
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
Poster Presentation on "Artifact Characterization and Removal for In-Vivo Neu...
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
 
Bias correction, and other uncertainty management techniques
Bias correction, and other uncertainty management techniquesBias correction, and other uncertainty management techniques
Bias correction, and other uncertainty management techniques
 
Uncertainties in large scale power systems
Uncertainties in large scale power systemsUncertainties in large scale power systems
Uncertainties in large scale power systems
 
Adaptive equalization
Adaptive equalizationAdaptive equalization
Adaptive equalization
 
20141003.journal club
20141003.journal club20141003.journal club
20141003.journal club
 

More from Xavier Llorà

Meandre 2.0 Alpha Preview
Meandre 2.0 Alpha PreviewMeandre 2.0 Alpha Preview
Meandre 2.0 Alpha PreviewXavier Llorà
 
Soaring the Clouds with Meandre
Soaring the Clouds with MeandreSoaring the Clouds with Meandre
Soaring the Clouds with MeandreXavier Llorà
 
From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0
From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0
From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0Xavier Llorà
 
Large Scale Data Mining using Genetics-Based Machine Learning
Large Scale Data Mining using   Genetics-Based Machine LearningLarge Scale Data Mining using   Genetics-Based Machine Learning
Large Scale Data Mining using Genetics-Based Machine LearningXavier Llorà
 
Data-Intensive Computing for Competent Genetic Algorithms: A Pilot Study us...
Data-Intensive Computing for  Competent Genetic Algorithms:  A Pilot Study us...Data-Intensive Computing for  Competent Genetic Algorithms:  A Pilot Study us...
Data-Intensive Computing for Competent Genetic Algorithms: A Pilot Study us...Xavier Llorà
 
Scalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new Trends
Scalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new TrendsScalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new Trends
Scalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new TrendsXavier Llorà
 
Pittsburgh Learning Classifier Systems for Protein Structure Prediction: Sca...
Pittsburgh Learning Classifier Systems for Protein  Structure Prediction: Sca...Pittsburgh Learning Classifier Systems for Protein  Structure Prediction: Sca...
Pittsburgh Learning Classifier Systems for Protein Structure Prediction: Sca...Xavier Llorà
 
Towards a Theoretical Towards a Theoretical Framework for LCS Framework fo...
Towards a Theoretical  Towards a Theoretical  Framework for LCS  Framework fo...Towards a Theoretical  Towards a Theoretical  Framework for LCS  Framework fo...
Towards a Theoretical Towards a Theoretical Framework for LCS Framework fo...Xavier Llorà
 
Learning Classifier Systems for Class Imbalance Problems
Learning Classifier Systems  for Class Imbalance  ProblemsLearning Classifier Systems  for Class Imbalance  Problems
Learning Classifier Systems for Class Imbalance ProblemsXavier Llorà
 
A Retrospective Look at A Retrospective Look at Classifier System ResearchCl...
A Retrospective Look at  A Retrospective Look at  Classifier System ResearchCl...A Retrospective Look at  A Retrospective Look at  Classifier System ResearchCl...
A Retrospective Look at A Retrospective Look at Classifier System ResearchCl...Xavier Llorà
 
XCS: Current capabilities and future challenges
XCS: Current capabilities and future  challengesXCS: Current capabilities and future  challenges
XCS: Current capabilities and future challengesXavier Llorà
 
Searle, Intentionality, and the Future of Classifier Systems
Searle, Intentionality, and the  Future of Classifier SystemsSearle, Intentionality, and the  Future of Classifier Systems
Searle, Intentionality, and the Future of Classifier SystemsXavier Llorà
 
Computed Prediction: So far, so good. What now?
Computed Prediction:  So far, so good. What now?Computed Prediction:  So far, so good. What now?
Computed Prediction: So far, so good. What now?Xavier Llorà
 
Linkage Learning for Pittsburgh LCS: Making Problems Tractable
Linkage Learning for Pittsburgh LCS: Making Problems TractableLinkage Learning for Pittsburgh LCS: Making Problems Tractable
Linkage Learning for Pittsburgh LCS: Making Problems TractableXavier Llorà
 
Meandre: Semantic-Driven Data-Intensive Flows in the Clouds
Meandre: Semantic-Driven Data-Intensive Flows in the CloudsMeandre: Semantic-Driven Data-Intensive Flows in the Clouds
Meandre: Semantic-Driven Data-Intensive Flows in the CloudsXavier Llorà
 
ZigZag: The Meandring Language
ZigZag: The Meandring LanguageZigZag: The Meandring Language
ZigZag: The Meandring LanguageXavier Llorà
 
HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...
HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...
HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...Xavier Llorà
 
Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...
Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...
Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...Xavier Llorà
 
Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...
Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...
Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...Xavier Llorà
 

More from Xavier Llorà (20)

Meandre 2.0 Alpha Preview
Meandre 2.0 Alpha PreviewMeandre 2.0 Alpha Preview
Meandre 2.0 Alpha Preview
 
Soaring the Clouds with Meandre
Soaring the Clouds with MeandreSoaring the Clouds with Meandre
Soaring the Clouds with Meandre
 
From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0
From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0
From Galapagos to Twitter: Darwin, Natural Selection, and Web 2.0
 
Large Scale Data Mining using Genetics-Based Machine Learning
Large Scale Data Mining using   Genetics-Based Machine LearningLarge Scale Data Mining using   Genetics-Based Machine Learning
Large Scale Data Mining using Genetics-Based Machine Learning
 
Data-Intensive Computing for Competent Genetic Algorithms: A Pilot Study us...
Data-Intensive Computing for  Competent Genetic Algorithms:  A Pilot Study us...Data-Intensive Computing for  Competent Genetic Algorithms:  A Pilot Study us...
Data-Intensive Computing for Competent Genetic Algorithms: A Pilot Study us...
 
Scalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new Trends
Scalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new TrendsScalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new Trends
Scalabiltity in GBML, Accuracy-based Michigan Fuzzy LCS, and new Trends
 
Pittsburgh Learning Classifier Systems for Protein Structure Prediction: Sca...
Pittsburgh Learning Classifier Systems for Protein  Structure Prediction: Sca...Pittsburgh Learning Classifier Systems for Protein  Structure Prediction: Sca...
Pittsburgh Learning Classifier Systems for Protein Structure Prediction: Sca...
 
Towards a Theoretical Towards a Theoretical Framework for LCS Framework fo...
Towards a Theoretical  Towards a Theoretical  Framework for LCS  Framework fo...Towards a Theoretical  Towards a Theoretical  Framework for LCS  Framework fo...
Towards a Theoretical Towards a Theoretical Framework for LCS Framework fo...
 
Learning Classifier Systems for Class Imbalance Problems
Learning Classifier Systems  for Class Imbalance  ProblemsLearning Classifier Systems  for Class Imbalance  Problems
Learning Classifier Systems for Class Imbalance Problems
 
A Retrospective Look at A Retrospective Look at Classifier System ResearchCl...
A Retrospective Look at  A Retrospective Look at  Classifier System ResearchCl...A Retrospective Look at  A Retrospective Look at  Classifier System ResearchCl...
A Retrospective Look at A Retrospective Look at Classifier System ResearchCl...
 
XCS: Current capabilities and future challenges
XCS: Current capabilities and future  challengesXCS: Current capabilities and future  challenges
XCS: Current capabilities and future challenges
 
Searle, Intentionality, and the Future of Classifier Systems
Searle, Intentionality, and the  Future of Classifier SystemsSearle, Intentionality, and the  Future of Classifier Systems
Searle, Intentionality, and the Future of Classifier Systems
 
Computed Prediction: So far, so good. What now?
Computed Prediction:  So far, so good. What now?Computed Prediction:  So far, so good. What now?
Computed Prediction: So far, so good. What now?
 
NIGEL 2006 welcome
NIGEL 2006 welcomeNIGEL 2006 welcome
NIGEL 2006 welcome
 
Linkage Learning for Pittsburgh LCS: Making Problems Tractable
Linkage Learning for Pittsburgh LCS: Making Problems TractableLinkage Learning for Pittsburgh LCS: Making Problems Tractable
Linkage Learning for Pittsburgh LCS: Making Problems Tractable
 
Meandre: Semantic-Driven Data-Intensive Flows in the Clouds
Meandre: Semantic-Driven Data-Intensive Flows in the CloudsMeandre: Semantic-Driven Data-Intensive Flows in the Clouds
Meandre: Semantic-Driven Data-Intensive Flows in the Clouds
 
ZigZag: The Meandring Language
ZigZag: The Meandring LanguageZigZag: The Meandring Language
ZigZag: The Meandring Language
 
HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...
HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...
HUMIES 2007 Bronze Winner: Towards Better than Human Capability in Diagnosing...
 
Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...
Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...
Do not Match, Inherit: Fitness Surrogates for Genetics-Based Machine Learning...
 
Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...
Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...
Towards Better than Human Capability in Diagnosing Prostate Cancer Using Infr...
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Negative Selection for Algorithm for Anomaly Detection

  • 1. Professor, Department of Computer Science
  • 2. Role of Biological Immune System (BIS) • Its primary role is to distinguish the host (body cells) from external entities (pathogens). • When an entity is recognized as non-self (or dangerous) - activates several defense mechanisms leading to its destruction (or neutralization). • Subsequent exposure to similar entity results in rapid immune response (Secondary Response). • Overall behavior of the immune system is an emergent property of many local interactions. D. Dasgupta 2
  • 3. An abstract view of BIS: D. Dasgupta 3
  • 5. From the computational point of view, the immune system is a • Distributed information processing system • Novel pattern recognizer: Self/non-self (Danger) Discrimination • Multi-level Self regulated Defense System • Having unique mechanisms for – Decentralized control – Signaling and Message-passing – Co-stimulation – Learning and memory – Diversity D. Dasgupta 5
  • 6. Computational Models & Algorithms • Immune Network Models ( Jerne’74) • Negative Selection Algorithms (Forrest’94) • Immune Gene Libraries (Hightower’90) • Associative Memory (Gilbert’94, Smith’96) • Artificial Immune Systems (Hunt’95, Timmis’97) • Immune Agent Architecture (Mori’98, Dasgupta’99) • Artificial Germinal Centers (Dasgupta’ 02) • Other Models (Farmer’86, Bersini’90,Varela,’91, etc.) D. Dasgupta 6
  • 7. Artificial Immune Systems (AIS) Immunological Computational Typical Applications Problem Aspect Self/non-self Anomaly or change - Computer security recognition (NSA) detection - Fault detection Immune Networks Learning (supervised - Classification and unsupervised) - Clustering (AINE,RLAIS,AIRS, - Data analysis FuzzyAIS) - Stream data-mining Clonal selection Search, optimization - Function optimization (Clonalg, aiNet) Cell Mobility Distributed - SecAgent architectures (ImmAg) processing - Decentralized robot control D. Dasgupta 7
  • 8. Negative Selection Algorithm (NSA) ( Forrest ‘94) An algorithm for change detection based on the principles of self-nonself discrimination (by T Cell receptors) in the immune system. The receptors can detect antigens. Partition of the Universe of Antigens SNS: self and nonself (a and b)
  • 9. Illustration of NS Algorithm: Match Don’t Match Self r=2 1011 1011 strings (S) 1000 1101 Generate Detector Match random strings Set (R) No (R0) Yes Reject For binary representation: • There exists efficient BNS algorithm that runs on linear time with the size of self (D’haeseleer’96). – Efficient algorithm to count number of holes. – Theoretical analysis based on Information Theory. D. Dasgupta 9
  • 10. Defining the Negative Selection Algorithm (NSA) : • Define Self as a normal pattern of activity or stable behavior of a system/process – A collection of logically split segments (equal-size) of pattern sequence. – Represent the collection as a multiset S of strings of length l over a finite alphabet. • Generate a set R of detectors, each of which fails to match any string in S. • Monitor new observations (of S) for changes by continually testing the detectors matching against representatives of S. If any detector ever matches, a change ( or deviation) must have occurred in system behavior. D. Dasgupta 10
  • 11. NS Greedy Algorithm: (D’haeseleer’96) It can generate a diverse set of detectors to provide better coverage in the non-self space. Particularly, instead of generating detectors randomly (in the second phase), the greedy algorithm chooses detectors that are far apart, in order to avoid possible overlapping of detectors and to provide enough coverage in the non-self space.
  • 12. Partial Matching Rule (r-contiguous symbols) X: ABCBBCDEABCE Y: BCCBCCAEABAE Choose a threshold (r): r≤3 match (X, Y) = T PM ≅ m-r [(l - r) (m-1) / m + 1] m = size of alphabet l = num of symbols in string e.g.: strings of length l=30, matching length r=8 010101001001110010001111110100 111010101101110010100010011110 D. Dasgupta 12
  • 13. Anomaly Detection in Time Series • Dasgupta & Forrest (1996) on time series data, based on the previously discussed negative-selection algorithm. D. Dasgupta 13
  • 15. Analyzing the Expressiveness of Binary Matching Rules • 2-dimensional Euclidean problem space • NS with binary rules is applied • The generated detectors are mapped back to the problem space • Self set: a section of Mackey-Glass data set D. Dasgupta 15
  • 17. Generated Coverings 10010100 10010100 10010100 11010110 11010110 **0101** 1+0+1+1+1+1+0+1=6 Hamming r-chunk r-contiguous Binary Gray r=9 r=8 r = 12 D. Dasgupta 17
  • 18. Shape of Binary Matching Rules 1100001010100011 1100001010100011 1001000010001000 1000000010000000 1000000010000000 ****00001000**** 1 1111 111 111 = 11 Hamming r-contiguous r-chunk Binary Gray r=4 r=8 r=8 D. Dasgupta 18
  • 19. Coverings Generated by Different Values of r r=6 r=7 r=8 r=9 D. Dasgupta 19
  • 20. Limitations of BMRs in NSA Binary matching rules are not able to capture the semantics of some complex self/non-self spaces. It is not easy to extract meaningful domain knowledge. Scalability issues: In some cases, large number of detectors are needed to guarantee a good level of detection. It is difficult to integrate the NS algorithm with other immune algorithms. Crisp boundary of self and non-self may be hard to define D. Dasgupta 20
  • 21. Advances in NSA: Developments in NSA New detector gene- Non-crisp self/non-self New representation ration algorithms distinction Hybrid Immune Learning Algorithm Hyper-rectangles Fuzzy If-Then Hyper-spheres rules Crisp If-Then rules NSDR: RNS NSFDR - Seq Niching RRNS - Det. Crowding D. Dasgupta 21 Multi-shaped
  • 22. Real-Valued Self/Non-self Space Use of a multi-dimensional real representation of the space: – Appropriate for diverse applications – Some geometrical properties X1 of Rn that may speed up the Non_Self negative selection – It is easier to map the Self detectors back to the problem Self space – Other AIS approaches use X this kind of representation D. Dasgupta 22
  • 23. Evolving Fault detectors • Goal: to evolve 'good' fault indicators (detectors) in the non-self (abnormal) space. • 'good' detector means: – It must not cover self. – It has to be as general as possible: the larger the volume, the better. – Collectively provide maximum coverage of the non- self space with minimum overlap • Some detectors serve as specialized (signature for known fault conditions) and others are for probable (or possible) faulty conditions. D. Dasgupta 23
  • 24. RNS Algorithm: Flow Diagram D. Dasgupta 24
  • 25. NS Rule Evolution: Different Levels of Deviation • Define different levels of variability Normal on the self set. Normal • Evolve detectors for the different levels. Normal Level 1 Level 2 D. Dasgupta 25
  • 26. A Heuristic Algorithm for Generating Hyper-spherical Detectors (RNS) Self Data Generate random Optimize detector population of distribution detectors D. Dasgupta 26
  • 27. Generation of Detector using Genetic Algorithm Self Data Replace closest Generate Choose Initial two parents parent if fitness population and cross them is better. D. Dasgupta 27
  • 29. Anomaly Detection Function µself : Rn Range Abnormal Crisp Normal X1 Abnormal Non_Self Non-crisp Self discrete Self Normal X0 Abnormal Fuzzy Normal D. Dasgupta 29
  • 30. Immunity Based Fault Detection F1 Non_Self F4 Self F2 Self F3 D. Dasgupta 30 Concept Illustration
  • 31.
  • 33. Fault Activated Detection False Alarm (mean) False Type Detectors Rate (mean) Alarm (std) Left 10 97.8 % 0.15 % 0.33% Engine Tail 3 9 94.7 % 0.76 % 0.26% Tail 1 7 91.8 % 1.04% 0.47% Wing 3 3 95.6 % 0.43% 0.36%
  • 34. Testing of two different faults (Tail and wing failure) Type of Fault Tail Wing # of activated detectors 82 108 Detection rate (mean) 89% 92% Detection rate (Std) 1.43 1.67 False Alarm (mean) 0.87% 0.98% False Alarm (Std) 0.45 0.32 D. Dasgupta 34
  • 35. Variable size Fault Detectors D. Dasgupta 35
  • 36. Combining Negative Selection (NS) and Classification Techniques for Anomaly Detection (Gonzalez’02) • The idea is to combine conventional classification algorithms and Artificial Immune Systems techniques to perform anomaly detection. – In many anomaly detection applications, only positive (normal) samples are available at the training stage. – Conventional classification algorithms need positive and negative samples. – The proposed approach uses the positive (normal) samples to generate negative samples that are used as training data for a neural network. D. Dasgupta 36
  • 38. Advantages of Negative Selection • From an information theory point of view, characterization of the normal space is equivalent to the characterization of the abnormal space. • Distributed detection: Different set of detectors can be distributed at different location • Other possibilities – Generalized and specialized detectors – Dynamic detector sets – Detectors with specific features – Artificial Fault signatures – Data samples for classification techniques D. Dasgupta 38
  • 39. Multilevel Immune Learning Algorithm D. Dasgupta 39
  • 41. MILA Algorithm Implementation: Basic Strategies Shape-space model: e.g., Ag or Ab is represented as m = < m1, m2 …, mL> Euclidean distance: calculate the degree of Ag-Ab interaction. Partial matching rule: Ag match Ab D. Dasgupta 41
  • 42. Algorithm Implementation: Basic Strategies APC recognition: default Th recognition: low-level Ts recognition: suppression B recognition: high-level Cloning and mutation o targeted (not blind) cloning o positive selection (higher affinity) and negative selection (self tolerant) D. Dasgupta 42
  • 43. Low Level Th recognition a1, a2, a3, a4, a 5, a6, a7, a8, a9, a10, … ad Peptide length = k = 4 D. Dasgupta 43
  • 44. High Level B recognition go back 1, m1 3, m2 L, mL B a1 a2 aL Ag D. Dasgupta 44 1 3 L
  • 45. Mysterious Cell---- Ts cell Ts exactly exists in body and suppresses immune response! Ts has specificity for special antigen. Mechanism remains unknown For the problem of anomaly detection, Ts detector is regarded as a special self-detecting agent. Initialization phase: Ts detector will be selected if it still matches the self-antigen under more stringent threshold. Recognition phase: the response will be terminated when Ts detector matches a special antigen resembling self-data pattern. D. Dasgupta 45
  • 46. Dynamic detector sets Normal Sample Testing Sample ROC 5 5 ROC 1 ROC 4 ROC 3 ROC 2 1 4 2 3 Dynamic Detector set D. Dasgupta 46
  • 47. New Features of MILA Combines several immunological metaphors instead of implementing in a piecemeal manner. Uses multiple strategies for detection to make the system either very sensitive to any changes or robust to noise. Detector generation is problem dependent: different threshold parameters are available tuning the system performance D. Dasgupta 47
  • 48. New Features of MILA (Cont..) Detector set in MILA is dynamic whereas detector set in Negative Selection Algorithm remains constant once it is generated in training phase. The cloning, mutation and selection after detect phase in MILA is actually a process of on-line learning and optimization. The process of cloning in MILA is a targeted (not blind) cloning. Only those detectors that are activated in recognition phase can be cloned. This strategy ensures that both the speed and accuracy of detection becomes successively higher after each detecting. D. Dasgupta 48
  • 49. Summary • AIS emerged in 1990s as a new paradigm in AI, and has earned its position on the map of soft computing • Being used in many applications – anomaly detection, pattern recognition, data mining, computer security, adaptive control, fault detection • The long-term usefulness of AIS methods still depend on – Uniqueness – Effectiveness We need unified AIS architecture and/or algorithm D. Dasgupta 49
  • 50. For Information on Artificial Immune System Related Events and Bibliography Visit the website http://www.cs.memphis.edu/~dasgupta/AIS/ The University of Memphis