Abstract
This paper summarises the current literature on immune system function and behaviour, including pattern recognition receptors, danger theory, central and peripheral tolerance, and memory cells. An artificial immune system framework is then presented based on the analogies of these natural system components and a rule and feature-based problem representation. A data set for intrusion detection is used to highlight the principles of the framework.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
The UCI KDD Archive: Kdd cup 1999 data (1999) (last modified, October 28, 1999), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Hart, E., Timmis, J.: Application areas of ais: The past, the present and the future. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 126–138. Springer, Heidelberg (2005)
Playfair, J., Bancroft, G.: Infection and immunity, 2nd edn. Oxford University Press, Oxford (2004)
Janeway, C., Travers, P.: Immunobiology: the immune system in health and disease, 5th edn. Current Biology. Garland Pub., London, San Francisco (2001)
Lydyard, P.M., Whelan, A., Fanger, M.W.: Immunology, 2nd edn. Instant Notes Series. Bios Scientific, London (2004)
Matzinger, P.: Tolerance, danger, and the extended family. Annual Reviews of Immunology 12, 991–1045 (1994)
Matzinger, P.: The danger model: A renewed sense of self. Science 296, 301 (2002)
Walker, L., Abbas, A.: The enemy within: keeping self-reactive t cells at bay in the periphery. Nature Reviews Immunology 2, 11–19 (2002)
Cohn, M.: An alternative to current thinking about positive selection, negative selection and activation of t cells. Immunology 111, 375–380 (2004)
Hofmeyr, S., Forrest, S.: Immunity by design: An artificial immune system. In: Banzhaf, W., et al. (eds.) Genetic and Evolutionary Computation Conference (GECCO), pp. 1289–1296 (1999)
Kim, J., Ong, A., Overill, R.E.: Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. In: Sarker, R., et al. (eds.) Congress on Evolutionary Computation, Canberra, Australia, pp. 405–412. IEEE Press, Los Alamitos (2003)
Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Research in Security and Privacy, pp. 202–212. IEEE Computer Society Press, Los Alamitos (1994)
Kim, J., Bentley, P.: Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation CEC 2001, pp. 1244–1252 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Middlemiss, M., Whigham, P.A. (2006). Innate and Adaptive Principles for an Artificial Immune System. In: Wang, TD., et al. Simulated Evolution and Learning. SEAL 2006. Lecture Notes in Computer Science, vol 4247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11903697_12
Download citation
DOI: https://doi.org/10.1007/11903697_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47331-2
Online ISBN: 978-3-540-47332-9
eBook Packages: Computer ScienceComputer Science (R0)