Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2245276.2245326acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Artificial Immune Systems: Models, Applications, and challenges

Published: 26 March 2012 Publication History

Abstract

The Natural Immune System (NIS) is a distributed, multi-layered, adaptive, dynamic, and life-long learning system. The Artificial Immune System (AIS) is a computational system inspired by the principles and processes of the NIS. The field of AIS has obtained some degree of success as a branch of computational intelligence since it emerged in the 1990s. In this paper, we review the models and applications proposed in the last few years. In addition, we present some challenges that the AIS is facing to really distinguish itself from other established systems, in particular, biology-inspired systems (e.g., artificial neural networks and evolutionary algorithms).

References

[1]
http://www.artificial-immune-systems.org.
[2]
R. Alves, M. Delgado, H. Lopes, and A. Freitas. An artificial immune system for fuzzy-rule induction in data mining. In Parallel Problem Solving from Nature-PPSN VIII, pages 1011--1020. Springer, 2004.
[3]
H. Bersini and F. Varela. Hints for adaptive problem solving gleaned from immune networks. Parallel problem solving from nature, pages 343--354, 1991.
[4]
M. Burgess. Computer immunology. In Proceedings of the 12th USENIX conference on System administration, pages 283--298. USENIX Association, 1998.
[5]
L. N. D. Castro and F. J. V. Zuben. An evolutionary immune network for data clustering. In Brazilian Symposium on Neural Networks, pages 84--89, 2000.
[6]
V. Cutello, G. Narzisi, G. Nicosia, and M. Pavone. Clonal selection algorithms: A comparative case study using effective mutation potentials. In International Conference on Artificial Immune Systems, pages 13--28, 2005.
[7]
F. N. D. Dasgupta, S. Yu. Recent advances in artificial immune systems. Applied Soft Computing, 11, Issue 2: 1574--1587, 2010.
[8]
L. De Castro and F. Von Zuben. The clonal selection algorithm with engineering applications. In Proceedings of GECCO'00, workshop on artificial immune systems and their applications, volume 3637, 2000.
[9]
T. D. Do, S. C. Hui, A. C. M. Fong, and B. Fong. Associative classification with artificial immune system. IEEE Transactions on Evolutionary Computation, 13: 217--228, 2009.
[10]
J. Farmer, N. Packard, and A. Perelson. The immune system, adaptation, and machine learning. Physica D: Nonlinear Phenomena, 22(1--3): 187--204, 1986.
[11]
S. Forrest, A. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on, pages 202--212. IEEE, 1994.
[12]
A. A. Freitas and J. Timmis. Revisiting the foundations of artificial immune systems: a problem-oriented perspective. In Hart (Eds.) Artificial Immune Systems (Proc. ICARIS-2003), LNCS 2787, pages 229--241. Springer, 2003.
[13]
F. Gu, J. Feyereisl, R. Oates, J. Reps, J. Greensmith, and U. Aickelin. Quiet in class: Classification, noise and the dendritic cell algorithm. In Artificial Immune Systems. Springer, 2011.
[14]
E. Hart and J. Timmis. Application areas of ais: The past, the present and the future. Applied Soft Computing, 8(1): 191--201, 2008.
[15]
J. Hunt and D. Cooke. Learning using an artificial immune system. Journal of network and computer applications, 19(2): 189--212, 1996.
[16]
Y. Ishida. Fully distributed diagnosis by pdp learning algorithm: towards immune network pdp model. In Neural Networks, 1990., 1990 IJCNN International Joint Conference on, pages 777--782. IEEE, 1990.
[17]
N. Jerne. Towards a network theory of the immune system. Annals of Immunology, 125C: 373--389, 1974.
[18]
J. Kephart. A biologically inspired immune system for computers. In Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, pages 130--139. MIT Press, Cambridge, MA, 1994.
[19]
J. Kim, P. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross. Immune system approaches to intrusion detection--a review. Natural computing, 6(4): 413--466, 2007.
[20]
P. Matzinger. Tolerance, danger, and the extended family. Annual review of immunology, 12(1): 991--1045, 1994.
[21]
P. Matzinger. The danger model: a renewed sense of self. Science, 296(5566): 301--305, 2002.
[22]
A. Somayaji, S. Hofmeyr, and S. Forrest. Principles of a computer immune system. In Proceedings of the 1997 workshop on New security paradigms, pages 75--82. ACM, 1998.
[23]
J. Timmis, A. Hone, T. Stibor, and E. Clark. Theoretical advances in artificial immune systems. Theoretical Computer Science, 403(1): 11--32, 2008.
[24]
A. Watkins. Exploiting immunological metaphors in the development of serial, parallel and distributed learning algorithms. PhD thesis, University of Kent, Computing Laboratory, 2005.
[25]
A. Watkins and J. Timmis. Exploiting parallelism inherent in airs, an artificial immune classifier. In Artificial Immune Systems, pages 427--438. Springer, 2004.
[26]
H. Zheng, Z. Du Jiaying, and Y. Wang. Research on vehicle image classifier based on concentration regulating of immune clonal selection. In Fourth International Conference on Natural Computation, pages 671--675. IEEE, 2008.

Cited By

View all
  • (2020)A Security Defense Model for SCADA System Based on Game Theory2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)10.1109/ICMTMA50254.2020.00064(253-258)Online publication date: Feb-2020
  • (2020)Artificial Immune Systems approaches to secure the internet of thingsJournal of Network and Computer Applications10.1016/j.jnca.2020.102537157:COnline publication date: 1-Jul-2020
  • (2020)Adaptive Artificial Immune System for Biological Network AlignmentIntelligent Computing Theories and Application10.1007/978-3-030-60802-6_49(560-570)Online publication date: 5-Oct-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
March 2012
2179 pages
ISBN:9781450308571
DOI:10.1145/2245276
  • Conference Chairs:
  • Sascha Ossowski,
  • Paola Lecca

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. artificial immune system
  2. clonal selection
  3. danger theory
  4. immune network
  5. negative selection

Qualifiers

  • Poster

Conference

SAC 2012
Sponsor:
SAC 2012: ACM Symposium on Applied Computing
March 26 - 30, 2012
Trento, Italy

Acceptance Rates

SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2020)A Security Defense Model for SCADA System Based on Game Theory2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)10.1109/ICMTMA50254.2020.00064(253-258)Online publication date: Feb-2020
  • (2020)Artificial Immune Systems approaches to secure the internet of thingsJournal of Network and Computer Applications10.1016/j.jnca.2020.102537157:COnline publication date: 1-Jul-2020
  • (2020)Adaptive Artificial Immune System for Biological Network AlignmentIntelligent Computing Theories and Application10.1007/978-3-030-60802-6_49(560-570)Online publication date: 5-Oct-2020
  • (2019)A Bio-immunology Inspired Industrial Control System Security ModelFirst International Conference on Sustainable Technologies for Computational Intelligence10.1007/978-981-15-0029-9_64(823-835)Online publication date: 2-Nov-2019
  • (2015)Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)10.1109/ETNCC.2015.7184812(79-84)Online publication date: May-2015
  • (2013)Mobile agent based artificial immune system for machine condition monitoring2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA)10.1109/ICIEA.2013.6566349(108-113)Online publication date: Jun-2013

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media