Innate and Adaptive Principles for an Artificial Immune System

This paper summarises the current literature on immune system function and behaviour, including pattern recognition receptors, danger theory, central and peripheral tolerance, and memory cells. An artificial immune system framework is then presented based on the analogies of these natural system components and a rule and feature-based problem representation. A data set for intrusion detection is used to highlight the principles of the framework.

[1]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[2]  Melvin Cohn,et al.  An alternative to current thinking about positive selection, negative selection and activation of T cells , 2004, Immunology.

[3]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  A. Abbas,et al.  The enemy within: keeping self-reactive T cells at bay in the periphery , 2002, Nature Reviews Immunology.

[5]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[6]  Bashir A. Lwaleed,et al.  Instant notes in immunology, Lydyard, P.M., Whelan, A. and Fanger, M.W. Bios Scientific Publishers Ltd (Book review) , 2002 .

[7]  Jonathan Timmis,et al.  Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.

[8]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[9]  Richard E. Overill,et al.  Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[10]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[11]  C. Janeway Immunobiology: The Immune System in Health and Disease , 1996 .

[12]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[13]  Jonathan Timmis,et al.  Application areas of AIS: The past, the present and the future , 2008, Appl. Soft Comput..