Artificial Dendritic Cells: Multi-faceted Perspectives

Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body. The detection of such invaders by dendritic cells results in the activation of the adaptive immune system, eventually leading to the removal of the invader from the host body. This mechanism has provided inspiration for the development of a novel bio-inspired algorithm, the Dendritic Cell Algorithm. This algorithm processes information at multiple levels of resolution, resulting in the creation of information granules of variable structure. In this chapter we examine the multi-faceted nature of immunology and how research in this field has shaped the function of the resulting Dendritic Cell Algorithm. A brief overview of the algorithm is given in combination with the details of the processes used for its development. The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems.

[1]  Claudia Eckert,et al.  On Permutation Masks in Hamming Negative Selection , 2006, ICARIS.

[2]  Julie Greensmith,et al.  Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.

[3]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[4]  Arthur M. Silverstein Paul Ehrlich, archives and the history of immunology , 2005, Nature Immunology.

[5]  Julie Greensmith,et al.  The DCA: SOMe comparison , 2008, Evol. Intell..

[6]  C. Janeway Approaching the asymptote? Evolution and revolution in immunology. , 1989, Cold Spring Harbor symposia on quantitative biology.

[7]  Tsau Young Lin,et al.  Granular Computing , 2003, RSFDGrC.

[8]  Witold Pedrycz,et al.  Granular computing: an introduction , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[9]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[10]  Julie Greensmith,et al.  DCA for Bot Detection , 2008 .

[11]  Graham Kendall,et al.  Frequency analysis for dendritic cell population tuning , 2008, Evol. Intell..

[12]  Julie Greensmith,et al.  Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows , 2008, ICARIS.

[13]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[14]  Justin Balthrop RIOT: A Responsive System for Mitigating Computer Network Epidemics and Attacks , 2005 .

[15]  K. P. Murphy,et al.  Janeway's immunobiology , 2007 .

[16]  Julie Greensmith,et al.  The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.

[17]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[18]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: A New Computational Approach , 2002 .

[19]  Uwe Aickelin,et al.  libtissue - implementing innate immunity , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[20]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[21]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  Gerold Schuler,et al.  Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.

[23]  Julie Greensmith,et al.  The dendritic cell algorithm , 2007 .

[24]  Irun R. Cohen,et al.  Real and artificial immune systems: computing the state of the body , 2007, Nature Reviews Immunology.

[25]  Peter J. Bentley,et al.  Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.

[26]  Julie Greensmith,et al.  The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.

[27]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[28]  Zhou Ji,et al.  Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.