UTHM Institutional Repository

Artificial immune system based on real valued negative selection algorithms for anomaly detection

Khairi, Rihab Salah (2015) Artificial immune system based on real valued negative selection algorithms for anomaly detection. Masters thesis, Universiti Tun Hussein Onn Malaysia.

[img] PDF

Download (615kB)


The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. Self data are regarded as the normal behavioral pattern of the monitored system. In this research, the Real-Valued Negative Selection with fixed-sized detectors (RNSA) and Real-Valued Negative Selection with variable-sized detectors (V-Detector) were applied for classification and detection of anomalies. The issue of integrity and confidentiality of data have been in existence for decades. Data have been tampered and altered either by a computer user or unauthorized access via hacking. In this research, the Negative Selection Algorithms were deployed. On the contrary, the experiments with various and well-known datasets show that NSAs have great flexibility to balance between efficiency and robustness and to accommodate domain-oriented elements in the method. Classifier algorithms, namely the Support Vector Machine and K-Nearest Neighbours were used for benchmarking the performance of the Real-Valued Negative Selection Algorithms. Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. The results shown in this study illustrate the effectiveness of the anomaly detection techniques on Iris, Balance-Scale, Lenses and Hayes-Roth datasets. On the whole, the RNSA and V-Detector outperformed SVM and KNN on all datasets by producing higher detection rates, lower false alarm rates and execution times. This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.

Item Type: Thesis (Masters)
Subjects: Q Science > QA Mathematics > QA75 Calculating machines > QA75.5 Electronic computers. Computer science
Depositing User: Normajihan Abd. Rahman
Date Deposited: 04 Jun 2015 06:53
Last Modified: 04 Jun 2015 06:53
URI: http://eprints.uthm.edu.my/id/eprint/6938
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item


Downloads per month over past year