Advertisement

Innate and Adaptive Principles for an Artificial Immune System

  • M. Middlemiss
  • P. A. Whigham
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4247)

Abstract

This paper summarises the current literature on immune system function and behaviour, including pattern recognition receptors, danger theory, central and peripheral tolerance, and memory cells. An artificial immune system framework is then presented based on the analogies of these natural system components and a rule and feature-based problem representation. A data set for intrusion detection is used to highlight the principles of the framework.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    The UCI KDD Archive: Kdd cup 1999 data (1999) (last modified, October 28, 1999), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  2. 2.
    Hart, E., Timmis, J.: Application areas of ais: The past, the present and the future. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 126–138. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Playfair, J., Bancroft, G.: Infection and immunity, 2nd edn. Oxford University Press, Oxford (2004)Google Scholar
  4. 4.
    Janeway, C., Travers, P.: Immunobiology: the immune system in health and disease, 5th edn. Current Biology. Garland Pub., London, San Francisco (2001)Google Scholar
  5. 5.
    Lydyard, P.M., Whelan, A., Fanger, M.W.: Immunology, 2nd edn. Instant Notes Series. Bios Scientific, London (2004)Google Scholar
  6. 6.
    Matzinger, P.: Tolerance, danger, and the extended family. Annual Reviews of Immunology 12, 991–1045 (1994)CrossRefGoogle Scholar
  7. 7.
    Matzinger, P.: The danger model: A renewed sense of self. Science 296, 301 (2002)CrossRefGoogle Scholar
  8. 8.
    Walker, L., Abbas, A.: The enemy within: keeping self-reactive t cells at bay in the periphery. Nature Reviews Immunology 2, 11–19 (2002)CrossRefGoogle Scholar
  9. 9.
    Cohn, M.: An alternative to current thinking about positive selection, negative selection and activation of t cells. Immunology 111, 375–380 (2004)CrossRefGoogle Scholar
  10. 10.
    Hofmeyr, S., Forrest, S.: Immunity by design: An artificial immune system. In: Banzhaf, W., et al. (eds.) Genetic and Evolutionary Computation Conference (GECCO), pp. 1289–1296 (1999)Google Scholar
  11. 11.
    Kim, J., Ong, A., Overill, R.E.: Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. In: Sarker, R., et al. (eds.) Congress on Evolutionary Computation, Canberra, Australia, pp. 405–412. IEEE Press, Los Alamitos (2003)Google Scholar
  12. 12.
    Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Research in Security and Privacy, pp. 202–212. IEEE Computer Society Press, Los Alamitos (1994)Google Scholar
  13. 13.
    Kim, J., Bentley, P.: Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation CEC 2001, pp. 1244–1252 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • M. Middlemiss
    • 1
  • P. A. Whigham
    • 1
  1. 1.Information Science DepartmentUniversity of OtagoDunedinN.Z.

Personalised recommendations