Discriminative power of the receptors activated by k-contiguous bits rule

The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire.

[1]  Dipankar Dasgupta,et al.  Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[2]  John E. Hunt,et al.  Learning using an artificial immune system , 1996 .

[3]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[4]  Hugues Bersini,et al.  Hints for Adaptive Problem Solving Gleaned from Immune Networks , 1990, PPSN.

[5]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[6]  G. Weisbuch,et al.  Immunology for physicists , 1997 .

[7]  S. Forrest,et al.  Antibody repertoires and pathogen recognition: the role of germline diversity and somatic hypermutation , 1999 .

[8]  J. Doyne Farmer,et al.  A Rosetta stone for connectionism , 1990 .

[9]  Jon Timmis,et al.  Jisys: The Envelopment of an Artificial Immune System for Real World Applications , 1999 .

[10]  Alan S. Perelson,et al.  The Evolution of Emergent Organization in Immune System Gene Libraries , 1995, ICGA.

[11]  A. Perelson,et al.  Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. , 1993, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Peter Ross,et al.  Producing robust schedules via an artificial immune system , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[13]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[14]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[16]  John E. Hunt,et al.  Case Memory and Retrieval Based on the Immune System , 1995, ICCBR.

[17]  Philippe Collard,et al.  From GAs to artificial immune systems: improving adaptation in time dependent optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).

[18]  Alan S. Perelson,et al.  Searching for Diverse, Cooperative Populations with Genetic Algorithms , 1993, Evolutionary Computation.

[19]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[20]  Zbigniew Michalewicz,et al.  Evolutionary Computation 1 , 2018 .

[21]  Dipankar Dasgupta,et al.  An Immunogenetic Approach to Spectra Recognition , 1999, GECCO.