Skip to main content

Biologically Motivated Approaches for Complex Problem Solving

  • Conference paper
  • First Online:
Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)

Part of the book series: Lecture Notes in Bioengineering ((LNBE))

  • 971 Accesses

Abstract

Danger Theory is presented with particular predominance on analogies in the Artificial Immune Systems world. Artificial Immune System (AIS) is relatively naive paradigm for intelligent computations. The inspiration for AIS is derived from natural Immune System (IS). The idea is that the artificial cells release signals describing their status, e.g., safe signals and danger signals. The various artificial cells use the signals in order to adapt their behavior. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e., linking it directly to the attacker. In this paper, we look at Danger Theory from the perspective of AIS practitioners and an overview of the Danger Theory is presented with particular emphasis on analogies in the Artificial Immune Systems world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Matzinger P (1998) An Innate sense of danger, Seminars in Immunology, pp 399–415

    Google Scholar 

  2. Matzinger P (2001) The danger model in its historical context. Scand J Immunol 54:4–9

    Article  Google Scholar 

  3. Matzinger P (1994) Tolerance danger and the extended family. Annu Rev Immunol 12:991–1045

    Article  Google Scholar 

  4. Burgess M (1998) Computer Immunology. Proc LISA XII:283–297

    Google Scholar 

  5. Williamson M (2002) Biologically inspired approaches to computer security, HP labs technical reports HPL-2002, pp 131

    Google Scholar 

  6. Somayaji A, Hofmeyr S, Forrest S (1998) Principles of a computer immune system. In: Proceedings New Security Paradigms Workshop, Charlottesville, pp 75–82

    Google Scholar 

  7. Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceedings of the 1st internet conference on artificial immune systems. ICARIS, Springer, pp 141–148

    Google Scholar 

  8. Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: the link between AIS and IDS? In: Proceedings ICARIS-2003, 2nd international conference on artificial immune systems. ICARIS, Springer, pp 147–155

    Google Scholar 

  9. Goldsby R, Kindt T, Osborne B (2000) Kuby immunology, 4th edn. W H Freeman, New York

    Google Scholar 

  10. Bretscher P, Cohn M (1970) A theory of self–nonself discrimination. Science 169:1042–1049

    Article  Google Scholar 

  11. Matzinger P (1994) Tolerance, danger and the extended family. Annu Rev Immunol 12:991–1045

    Article  Google Scholar 

  12. Sundaram A (1996) An introduction to intrusion detection, crossroads: the ACM student magazine 2(4)

    Google Scholar 

  13. Forrest S, Perelson A, Allen L, Cherukuri R (1994) Self non-self discrimination in a computer. In: Proceedings of the 1994 IEEE symposium on research in security and privacy, pp 202–212

    Google Scholar 

  14. Forrest S, Hofmeyr S, Somayaji A, Longstaff T (1996) A sense of self for unix processes. In: Proceedings of the 1996 IEEE symposium on research in security and privacy, pp 120–128

    Google Scholar 

  15. Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evolutionary Computation 8(4):443–473

    Google Scholar 

  16. Somayaji A, Forrest S (2000) Automated response using system-call delays. In: Proceedings of the ninth USENIX security symposium, pp 185–197

    Google Scholar 

Download references

Acknowledgments

We would like to thank the two anonymous reviewers, whose comments greatly improved this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sushil Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Kumar, S., Saurabh, P., Verma, B. (2013). Biologically Motivated Approaches for Complex Problem Solving. In: Kumar, V., Bhatele, M. (eds) Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012). Lecture Notes in Bioengineering. Springer, India. https://doi.org/10.1007/978-81-322-0970-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0970-6_23

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-0969-0

  • Online ISBN: 978-81-322-0970-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics