An Agent Based Classification Model

10/15/2009
by   Feng Gu, et al.
0

The major function of this model is to access the UCI Wisconsin Breast Can- cer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classifi cation can be referred as anomaly detection, which discriminates anomalous behaviour from normal behaviour in computer systems. One popular solution for anomaly detection is Artifi cial Immune Sys- tems (AIS). AIS are adaptive systems inspired by theoretical immunology and observed immune functions, principles and models which are applied to prob- lem solving. The Dendritic Cell Algorithm (DCA)[2] is an AIS algorithm that is developed specifi cally for anomaly detection. It has been successfully applied to intrusion detection in computer security. It is believed that agent-based mod- elling is an ideal approach for implementing AIS, as intelligent agents could be the perfect representations of immune entities in AIS. This model evaluates the feasibility of re-implementing the DCA in an agent-based simulation environ- ment called AnyLogic, where the immune entities in the DCA are represented by intelligent agents. If this model can be successfully implemented, it makes it possible to implement more complicated and adaptive AIS models in the agent-based simulation environment.

READ FULL TEXT
research
06/18/2010

Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems

Artificial Immune Systems have been successfully applied to a number of ...
research
11/29/2022

Novelty Detection for Election Fraud: A Case Study with Agent-Based Simulation Data

In this paper, we propose a robust election simulation model and indepen...
research
06/08/2010

ToLeRating UR-STD

A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Dange...
research
10/25/2020

On synthetic data generation for anomaly detection in complex social networks

This paper studies the feasibility of synthetic data generation for miss...
research
10/16/2009

An Immune Inspired Approach to Anomaly Detection

The immune system provides a rich metaphor for computer security: anomal...
research
06/25/2010

Detecting Danger: The Dendritic Cell Algorithm

The Dendritic Cell Algorithm (DCA) is inspired by the function of the de...
research
07/17/2011

From decision to action : intentionality, a guide for the specification of intelligent agents' behaviour

This article introduces a reflexion about behavioural specification for ...

Please sign up or login with your details

Forgot password? Click here to reset