Abstract
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or nonself cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Aickelin, U. and Cayzer, S., 2002c, The danger theory and its application to artificial immune systems, in: Proc. 1st Int. Conf. on Artificial Immune Systems (Canterbury, UK), pp. 141–148.
Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J., 2003, Danger theory: The link between artificial immune systems and intrusion detection systems, in: Proc. 2nd Int. Conf. on Artificial Immune Systems (Edinburgh), Springer, Berlin, pp. 147–155.
Aickelin, U., Greensmith, J. and Twycross, J., 2004, Immune system approaches to intrusion detection—a review, in: Proc. ICARIS-04, 3rd Int. Conf. on Artificial Immune Systems (Catania, Italy), Lecture Notes in Computer Science, Vol. 3239, Springer, Berlin, pp. 316–329.
Amazon, 2003, Recommendations, http://www.amazon.com/
Cayzer, S. and Aickelin, U., 2002a, A recommender system based on the immune network, in: Proc. CEC2002 (Honolulu, HI), pp. 807–813.
Cayzer, S. and Aickelin, U., 2002b, On the effects of idiotypic interactions for recommendation communities in artificial immune systems, in: Proc. 1st Int. Conf. on Artificial Immune Systems (Canterbury, UK), pp. 154–160.
Cuppens, F. et al., 2002, Correlation in an intrusion process, Internet Security Communication Workshop (SECI’02).
Dasgupta, D., ed., 1999, Artificial Immune Systems and Their Applications, Springer, Berlin.
Dasgupta, D., Gonzalez, F., 2002, An immunity-based technique to characterize intrusions in computer networks, IEEE Trans. Evol. Comput. 6:1081–1088.
de Castro, L. N. and Von Zuben, F. J., 2002, Learning and optimization using the clonal selection principle, IEEE Trans. Evol Comput., Special issue on artificial immune systems, 6:239–251.
Esponda, F., Forrest, S. and Helman, P., 2004, A formal framework for positive and negative detection, IEEE Trans. Syst., Man Cybernet., 34:357–373.
Farmer, J. D., Packard, N. H. and Perelson, A. S., 1986, The immune system, adaptation, and machine learning, Physica 22:187–204.
Forrest, S., Perelson, A. S., Allen, L. and Cherukuri, R., 1994, Self-nonself discrimination in a computer, in: Proc. IEEE Symp. on Research in Security and Privacy, (Oakland, CA), pp. 202–212.
Hightower, R. R., Forrest, S. and Perelson, A. S., 1995, The evolution of emergent organization in immune system gene libraries, Proc. 6th Conf on Genetic Algorithms, pp. 344–350.
Hoagland, J. and Staniford, S., 2002, Viewing Intrusion Detection Systems Alerts: Lessons from SnortSnarf, http://www.silicondefense.com/software/snortsnarf
Hofmeyr, S. and Forrest, S., 2000, Architecture for an artificial immune systems, Evol. Comput. 7:1289–1296.
Jerne, N. K., 1973, Towards a network theory of the immune system, Ann. Immunol. 125:373–389.
Kim, J. and Bentley, P., 1999, The artificial immune model for network intrusion detection, Proc. 7th Eur. Congress on Intelligent Techniques and Soft Computing (EUFIT’99).
Kim, J. and Bentley, P., 2001, Evaluating negative selection in an artificial immune systems for network intrusion detection, Proc. Genetic and Evolutionary Computation Conf 2001, pp. 1330–1337.
Kim, J. and Bentley, P., 2002, Towards an artificial immune systems for network intrusion detection: an investigation of dynamic clonal selection, Proc. Congress on Evolutionary Computation 2002, pp. 1015–1020.
Kubi, J., 2002, Kubi Immunology, 5th edn, Richard A. Goldsby, Thomas J. Kindt and Barbara A. Osborne, eds, Freeman, San Francisco.
Matzinger, P., 2003, http://cmmg.biosci.wayne.edu/asg/polly.html
Matzinger, P., 2001, The danger model in its historical context, Scand J. Immunol 54:4–9.
Matzinger, P., 1994, Tolerance, danger and the extended family, Ann. Rev. Immunol. 12:991–1045.
Morrison, T. and Aickelin, U., 2002, An artificial immune system as a recommender system for web sites, in: Proc. 1st Int. Conf. on Artificial Immune Systems (ICARIS-2002) (Canterbury, UK), pp. 161–169.
Ning, P., Cui, Y. and Reeves, S., 2002, Constructing attack scenarios through correlation of intrusion alerts, in: Proc. 9th ACM Conf. on Computer and Communications Security, pp. 245–254.
Perelson, A. S. and Weisbuch, G., 1997, Immunology for physicists, Rev. Mod. Phys. 69:1219–1267.
Resnick, P. and Varian, H. R., 1997, Recommender systems, Commun. ACM 40:56–58.
Valdes, A. and Skinner, K., 2001, Probabilistic alert correlation, Proc. RAID’2001, pp. 54–68.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Aickelin, U., Dasgupta, D. (2005). Artificial Immune Systems. In: Burke, E.K., Kendall, G. (eds) Search Methodologies. Springer, Boston, MA. https://doi.org/10.1007/0-387-28356-0_13
Download citation
DOI: https://doi.org/10.1007/0-387-28356-0_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23460-1
Online ISBN: 978-0-387-28356-2
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)