LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: Kluwer
Languages: English
Types: Part of book or chapter of book
Subjects:

Classified by OpenAIRE into

mesheuropmc: biochemical phenomena, metabolism, and nutrition
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years.\ud A novel computational intelligence technique, inspired by immunology, has emerged, called Artificial Immune Systems. Several concepts from the immune have been extracted and applied for solution to real world science and engineering problems. In this tutorial, we briefly describe the immune system metaphors that are relevant to existing Artificial Immune Systems methods. We will then show illustrative real-world problems suitable for Artificial Immune Systems and give a step-by-step algorithm walkthrough for one such problem. A comparison of the Artificial Immune Systems to other well-known algorithms, areas for future work, tips & tricks and a list of resources will round this tutorial off. It should be noted that as Artificial Immune Systems is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from time to time and from those examples given here.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Aickelin, U. and Cayzer, S., 2002c, The danger theory and its application to artificial immune systems, in: Proc. 1st Int. Conf. on Artificial Immune Systems (Canterbury, UK), pp. 141-148.
    • Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J., 2003, Danger theory: The link between artificial immune systems and intrusion detection systems, in: Proc. 2nd Int. Conf. on Artificial Immune Systems (Edinburgh), Springer, Berlin, pp. 147-155.
    • Aickelin, U., Greensmith, J. and Twycross, J., 2004, Immune system approaches to intrusion detection-a review, in: Proc. ICARIS-04, 3rd Int. Conf. on Artificial Immune Systems (Catania, Italy), Lecture Notes in Computer Science, Vol. 3239, pp. 316-329, Springer, Berlin.
    • Amazon, 2003, Recommendations, http://www.amazon.com/ Cayzer, S. and Aickelin, U., 2002a, A recommender system based on the immune network, in: Proc. CEC2002 (Honolulu, HI), pp. 807-813.
    • Cayzer, S. and Aickelin, U., 2002b, On the effects of idiotypic interactions for recommendation communities in artificial immune systems, in: Proc. 1st Int. Conf. on Artificial Immune Systems (Canterbury, UK), pp. 154-160.
    • Cuppens, F. et al., 2002, Correlation in an intrusion process, Internet Security Communication Workshop (SECI'02).
    • Dasgupta, D., ed., 1999, Artificial Immune Systems and Their Applications, Springer, Berlin.
    • Dasgupta, D., Gonzalez, F., 2002, An immunity-based technique to characterize intrusions in computer networks, IEEE Trans. Evol. Comput. 6:1081-1088.
    • de Castro, L. N. and Von Zuben, F. J., 2002, Learning and optimization using the clonal selection principle, IEEE Trans. Evol. Comput., Special issue on artificial immune systems, 6:239-251.
    • Esponda, F., Forrest, S. and Helman, P., 2004, A formal framework for positive and negative detection, IEEE Trans. Syst., Man Cybernet., 34:357-373.
    • Farmer, J. D., Packard, N. H. and Perelson, A. S., 1986, The immune system, adaptation, and machine learning, Physica 22:187-204.
    • Forrest, S., Perelson, A. S., Allen, L. and Cherukuri, R., 1994, Selfnonself discrimination in a computer, in: Proc. IEEE Symposium on Research in Security and Privacy, (Oakland, CA), pp. 202-212.
    • Hightower, R. R., Forrest, S. and Perelson, A. S., 1995, The evolution of emergent organization in immune system gene libraries, Proc. 6th Conference on Genetic Algorithms, pp. 344-350.
    • Hoagland, J. and Staniford, S., 2002, Viewing Intrusion Detection Systems Alerts: Lessons from SnortSnarf, http://www.silicondefense.com/ software/snortsnarf
    • Hofmeyr, S. and Forrest, S., 2000, Architecture for an artificial immune systems, Evol. Comput. 7:1289-1296.
    • Jerne, N. K., 1973, Towards a network theory of the immune system, Ann. Immunol. 125:373-389.
    • Kim, J. and Bentley, P., 1999, The artificial immune model for network intrusion detection, Proc. 7th Eur. Congress on Intelligent Techniques and Soft Computing (EUFIT'99).
    • Kim, J. and Bentley, P., 2001, Evaluating negative selection in an artificial immune systems for network intrusion detection, Proc. Genetic and Evolutionary Computation Conference 2001, pp. 1330-1337.
    • Kim, J. and Bentley, P., 2002, Towards an artificial immune systems for network intrusion detection: an investigation of dynamic clonal selection, Proc. Congress on Evolutionary Computation 2002, pp. 1015- 1020.
    • Kubi, J., 2002, Kubi Immunology, 5th edn, Richard A. Goldsby, Thomas J. Kindt and Barbara A. Osborne, eds, Freeman, San Francisco.
    • Matzinger, P., 2003, http://cmmg.biosci.wayne.edu/asg/polly.html Matzinger, P., 2001, The danger model in its historical context, Scand. J. Immunol. 54:4-9.
    • Matzinger, P., 1994, Tolerance, danger and the extended family, Ann. Rev. Immunol. 12:991-1045.
    • Morrison, T. and Aickelin, U., 2002, An artificial immune system as a recommender system for web sites, in: Proc. 1st Int. Conf. on Artificial Immune Systems (ICARIS-2002) (Canterbury, UK), pp. 161-169.
    • Ning, P., Cui, Y. and Reeves, S., 2002, Constructing attack scenarios through correlation of intrusion alerts, in: Proc. 9th ACM Conf. on Computer and Communications Security, pp. 245-254.
    • Perelson, A. S. and Weisbuch, G., 1997, Immunology for physicists, Rev. Mod. Phys. 69:1219-1267.
    • Resnick, P. and Varian, H. R., 1997, Recommender systems, Commun. ACM 40:56-58.
    • Valdes, A. and Skinner, K., 2001, Probabilistic alert correlation, Proc. RAID'2001, pp. 54-68.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article