Advertisement

MILA — Multilevel Immune Learning Algorithm

  • Dipankar Dasgupta
  • Senhua Yu
  • Nivedita Sumi Majumdar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2723)

Abstract

The biological immune system is an intricate network of specialized tissues, organs, cells, and chemical molecules. T-cell-dependent humoral immune response is one of the complex immunological events, involving interaction of B cells with antigens (Ag) and their proliferation, differentiation and subsequent secretion of antibodies (Ab). Inspired by these immunological principles, we proposed a Multilevel Immune Learning Algorithm (MILA) for novel pattern recognition. It incorporates multiple detection schema, clonal expansion and dynamic detector generation mechanisms in a single framework. Different test problems are studied and experimented with MILA for performance evaluation. Preliminary results show that MILA is flexible and efficient in detecting anomalies and novelties in data patterns.

Keywords

Detection Rate False Alarm Rate Anomaly Detection Artificial Immune System Recognition Phase 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dasgupta, D., Attoh-Okine, N.: Immunity-Based Systems: A Survey. In the proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Orlando, October 12–15, 1997Google Scholar
  2. 2.
    Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10) (1997) pp 88–96.CrossRefGoogle Scholar
  3. 3.
    Forrest, S., Somayaji, A., Ackley, D.: Building Diverse Computer Systems. Proc. of the Sixth Workshop on Hot Topics in Operating Systems (1997).Google Scholar
  4. 4.
    Forrest, S., Perelson, A. S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. Proc. of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, (1994) 202–212Google Scholar
  5. 5.
    Dasgupta, D., Forrest, S.: An Anomaly Detection Algorithm Inspired by the Immune System. In: Dasgupta D (eds) Artificial Immune Systems and Their Applications, Springer-Verlag, (1999) 262–277Google Scholar
  6. 6.
    Hollowood, K., Goodlad, J.R.: Germinal centre cell kinetics. J. Pathol.185(3) (1998) 229–33CrossRefGoogle Scholar
  7. 7.
    Perelson, A. S., Oster, G. F.: Theoretical studies of clonal selection: Minimal antibody repertoire size and reliability of self-non-self discrimination. J. Theor. Biol. 81(4) (1979) 645–670CrossRefMathSciNetGoogle Scholar
  8. 8.
    Keogh, E., Folias, T.: The UCR Time Series Data Mining Archive [http://www.cs.ucr.edu/~eamonn/TSDMA/index.html]. Riverside CA. University of California — Computer Science & Engineering Department. (2002)
  9. 9.
    D’haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: algorithms, analysis, and implications. Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, (1996) 110–119Google Scholar
  10. 10.
    de Castro, L. N., Von Zuben, F. J.: Learning and optimization using the clonal selection principle. IEEE Transactions on Evolutionary Computation 6(3) (2002) 239–251CrossRefGoogle Scholar
  11. 11.
    Gonzalez, F., Dasgupta, D.: Neuro-Immune and SOM-Based Approaches: A Comparison. Proceedings of 1st International Conference on Artificial Immune Systems (ICARIS-2002), University of Kent at Canterbury, UK, September 9th–11th, 2002Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Dipankar Dasgupta
    • 1
  • Senhua Yu
    • 1
  • Nivedita Sumi Majumdar
    • 1
  1. 1.Computer Science DivisionUniversity of MemphisMemphisUSA

Personalised recommendations