An Immuno-engineering Approach for Anomaly Detection in Swarm Robotics
نویسندگان
چکیده
In this paper, we present the first stage of our research strategy to develop an immune-inspired solution for detecting anomalies in a foraging swarm robotic system with an immuno-engineering approach. Within immuno-engineering, the initial stage of our research involves the understanding of problem domain, namely anomaly detection, in a foraging swarm robotic system deployed in dynamic environments. We present a systematically derived set of activities for this stage derived with Goal Structuring Notation and results of experiments carried out to establish the time-varying behaviour and how anomalies manifest themselves. Our future work will then be used to select and tailor an appropriate AIS algorithm to provide an effective and efficient means of anomaly detection.
منابع مشابه
Aggregation of Swarms for Fault Tolerance in Swarm Robotics using an Immuno-engineering Approach
We present initial studies in the development of an immune-inspired solution for fault tolerance for swarm aggregation in swarm robotics systems. Taking inspiration from granuloma formation, (a process in the immune system) we describe how this idea can be instantiated to address fault tolerance issues in swarm aggregation. We outline an immunoengineering approach, which requires us to model th...
متن کاملA Novel Ensemble Approach for Anomaly Detection in Wireless Sensor Networks Using Time-overlapped Sliding Windows
One of the most important issues concerning the sensor data in the Wireless Sensor Networks (WSNs) is the unexpected data which are acquired from the sensors. Today, there are numerous approaches for detecting anomalies in the WSNs, most of which are based on machine learning methods. In this research, we present a heuristic method based on the concept of “ensemble of classifiers” of data minin...
متن کاملNegative Selection Based Data Classification with Flexible Boundaries
One of the most important artificial immune algorithms is negative selection algorithm, which is an anomaly detection and pattern recognition technique; however, recent research has shown the successful application of this algorithm in data classification. Most of the negative selection methods consider deterministic boundaries to distinguish between self and non-self-spaces. In this paper, two...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملFraud Detection of Credit Cards Using Neuro-fuzzy Approach Based on TLBO and PSO Algorithms
The aim of this paper is to detect bank credit cards related frauds. The large amount of data and their similarity lead to a time consuming and low accurate separation of healthy and unhealthy samples behavior, by using traditional classifications. Therefore in this study, the Adaptive Neuro-Fuzzy Inference System (ANFIS) is used in order to reach a more efficient and accurate algorithm. By com...
متن کامل