Computer Science ›› 2024, Vol. 51 ›› Issue (5): 346-354.doi: 10.11896/jsjkx.231000027

• Information Security • Previous Articles     Next Articles

Study on Artificial Immune Detector Generation Algorithm Based on Label Influence Propagation

ZHOU Zunlong, CHEN Wen, MA Xinlei   

  1. School of Cyber Science and Engineering,Sichuan University,Chengdu 610065,China
  • Received:2023-10-07 Revised:2024-01-20 Online:2024-05-15 Published:2024-05-08
  • About author:ZHOU Zunlong,born in 1999,postgra-duate.His main research interests include network security and data mi-ning.
    CHEN Wen,born in 1983,Ph.D,asso-ciate professor,Ph.D supervisor.His main research interests include network security and data mining.

Abstract: Artificial immune systems utilize training samples to screen and train candidate detectors,so as to generate mature detectors covering non-self regions for self and non-self differentiation.The traditional negative selection algorithm(NSA) based detector generation algorithm usually requires a large number of labeled self training samples,while the limited number of labeled samples in practical applications leads to insufficient detector training,which restricts the detection accuracy of detectors.To address this problem,this paper proposes an immune detector training method based on label influence propagation,where label influence propagation is performed by a small number of labeled cluster members among samples belonging to the same cluster,and pseudo-labeling is performed for the unlabeled samples in the cluster.Subsequently,this paper removes low-confidence newly labeled samples based on noise-learning-based pseudo-labeling assessment.The newly labeled samples that passed the labeling assessment are added to the training sample set to extend the labeled sample size and improve the training quality of the immune detector.Comparative experimental results on seven types of UCI public datasets of different dimensions and sizes show that the proposed label influence propagation-based immune detection training algorithm is able to effectively improve the training performance of the detector,especially in the case of limited training samples or unbalanced datasets,the detector's performance is significantly better than the traditional methods.Compared with the detection generation algorithms such as PSA,co-PSA,GFNSA,etc,the recognition accuracy of the detector is improved by 10% on average.

Key words: Label influence propagation, Artificial immunity, Detector generation algorithms, Label evaluation

CLC Number: 

  • TP391
[1]FORREST S,PERELSON A,ALLEN L,et al.Self-nonself discrimination in a computer[C]//IEEE Symposium on Research in Security and Privacy.1994:202-212.
[2]GONZALEZ F,DASGUPTA D,NINO L.A randomized real-valued negativeselection algorithm[C]//Proc.2nd Symp.Artificial Immune Systems.2003:261-272.
[3]PERELSON A S,WEISBUCH G.Immunology for physicists[J].Reviews of Modern Physics,1997,69(4):1219-1267.
[4]IDRIS I,SELAMAT A,OMATU S.Hybrid email spam detection model with negative selection algorithm and differential evolution[J].Engineering Applications of Artificial Intelligence,2014,28:97-110.
[5]LUO W,WANG J,WANG X.Evolutionary negative selection algorithms for anomaly detection[C]//Proceedings of 8th Joint Conference on Information Sciences.Salt Lake City,America,2005,1:3.
[6]POGGIOLINI M,ENGELBRECHT A.Application of the feature-detection rule to the negative selection algorithm[J].Expert Systems with Applications,2013,40(8):3001-3014.
[7]MA W,TRAN D,SHARMAD.Negative selection with antigen feedback in intrusion detection[C]//Artificial Immune Systems:7th International Conference(ICARIS 2008).Berlin,Heidelberg:Springer,2008:200-209.
[8]OSTASZEWSKI M,SEREDYNSKI F,BOUVRYP.Immuneanomaly detection enhanced with evolutionary paradigms[C]//Proceedings of the 8th annual conference on Genetic and Evolutionary Computation.2006:119-126.
[9]OSTASZEWSKI M,SEREDYNSKI F,BOUVRYP.Coevolu-tionary-based mechanisms for network anomaly detection[J].Journal of Mathematical Modelling and Algorithms,2007,6:411-431.
[10]CHIKH R,CHIKHIS.Clustered negative selection algorithmand fruit fly optimization for email spam detection[J].Journal of Ambient Intelligence and Humanized Computing,2019,10(1):143-152.
[11]FOULADVAND S,OSAREH A,SHADGARB,et al.DENSA:An effective negative selection algorithm with flexible boundaries for self-space and dynamic number of detectors[J].Engineering Applications of Artificial Intelligence,2017,62:359-372.
[12]CHMIELEWSKI A.Tolerant V-Detector algorithm[J].Journal of Physics:Conference Series,2018,1061(1):012021.
[13]YANG C,JIA L,CHEN B Q,et al.Negative selection algorithm based on antigen density clustering[J].IEEE Access,2020,8:44967-44975.
[14]CHEN W,LI T,LIU X J,et al.A negative selection algorithm based on hierarchical clustering of self set[J].Science China Information Sciences,2013,56:1-13.
[15]CHEN W,DING X M,LI T,et al.Negative selection algorithm based on grid file of the feature space[J].Knowledge-Based Systems,2014,56:26-35.
[16]ZHU F,CHEN W,YANG H,et al.A quick negative selection algorithm for one-class classification in big data era[J/OL].Mathematical Problems in Engineering,2017.https://www.hindawi.com/journals/mpe/2017/3956415/.
[17]ZHOU X,TAN W.An Improved Artificial Immune Negative Selection Algorithm[C]//2022 7th International Conference on Intelligent Computing and Signal Processing(ICSP).IEEE,2022:237-241.
[18]SUN P,BAN L,JIAN H.Improved self-adaptive negative selection algorithm with double clustering for infrared target extraction[C]//2022 IEEE 5th International Conference on Automation,Electronics and Electrical Engineering(AUTEEE).IEEE,2022:378-382.
[19]NUHU A R,GUPTA K D,BEDADA W B,et al.Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints[C]//2022 IEEE Symposium Series on Computational Intelligence(SSCI).IEEE,2022:413-420.
[20]MO J,YANG H.Sampled Value Attack Detection for Busbar Differential Protection Based on a Negative Selection Immune System[J].Journal of Modern Power Systems and Clean Energy,2022,11(2):421-433.
[21]ZHANG G,HE J,LI W,et al.DGA-PSO:An improved detector generation algorithm based on particle swarm optimization in negative selection[J].Knowledge-Based Systems,2023,278:110892.
[22]ABID A,KHAN M T,HAQI U,et al.An improved negative selection algorithm-based fault detection method[J].IETE Journal of Research,2022,68(5):3406-3417.
[23]CHAUDHARI S,SHEVADE S.Learning from positive and unlabelled examples using maximum margin clustering[C]//Neural Information Processing:19th International Conference(ICONIP 2012).Berlin,Heidelberg:Springer,2012:465-473.
[24]ELKAN C.The foundations of cost-sensitive learning[C]//International Joint Conference on Artificial Intelligence.Lawrence Erlbaum Associates Ltd,2001:973-978.
[25]KIRYO R,NIU G,DU PLESSISM C,et al.Positive-unlabeled learning with non-negative risk estimator[J].Advances in Neural Information Processing Systems,2017,30:1675-1685.
[26]GUO T,XU C,HUANG J,et al.On positive-unlabeled classification in GAN[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8385-8393.
[27]LIANG S,ZHANG Y,MA J.Active model selection for positive unlabeled time series classification[C]//2020 IEEE 36th International Conference on Data Engineering(ICDE).IEEE,2020:361-372.
[28]DEVORE J L.Probability and Statistics for Engineering and the Sciences[M].Belmont:Duxbury Press,1995.
[29]GOLDMAN S,ZHOU Y.Enhancing supervised learning withunlabeled data[C]//ICML.2000:327-334.
[30]ANGLUIN D,LAIRD P.Learning from noisy examples[J].Machine Learning,1988,2:343-370.
[1] JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331.
[2] YANG Chao, QIN Ting-dong, FAN Bo, LI Tao. Study on Detection of Weibo Spammers Based on Danger Theory in Artificial Immunity System [J]. Computer Science, 2018, 45(11): 138-142.
[3] LIU Nian,LIU Sun-jun,LIU Yong,ZHAO Hui. Method of Network Security Situation Awareness Based on Artificial Immunity System [J]. Computer Science, 2010, 37(1): 126-129.
[4] CHAI Zheng-yi, WANG Hong-hai. Study of Anomaly Intrusion Detection System on False Positive Rate [J]. Computer Science, 2009, 36(11): 68-70.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!