Skip to main content

Artificial Immune Systems

  • Chapter

Abstract

The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or nonself cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aickelin, U. and Cayzer, S., 2002c, The danger theory and its application to artificial immune systems, in: Proc. 1st Int. Conf. on Artificial Immune Systems (Canterbury, UK), pp. 141–148.

    Google Scholar 

  • Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J., 2003, Danger theory: The link between artificial immune systems and intrusion detection systems, in: Proc. 2nd Int. Conf. on Artificial Immune Systems (Edinburgh), Springer, Berlin, pp. 147–155.

    Google Scholar 

  • Aickelin, U., Greensmith, J. and Twycross, J., 2004, Immune system approaches to intrusion detection—a review, in: Proc. ICARIS-04, 3rd Int. Conf. on Artificial Immune Systems (Catania, Italy), Lecture Notes in Computer Science, Vol. 3239, Springer, Berlin, pp. 316–329.

    Google Scholar 

  • Amazon, 2003, Recommendations, http://www.amazon.com/

    Google Scholar 

  • Cayzer, S. and Aickelin, U., 2002a, A recommender system based on the immune network, in: Proc. CEC2002 (Honolulu, HI), pp. 807–813.

    Google Scholar 

  • Cayzer, S. and Aickelin, U., 2002b, On the effects of idiotypic interactions for recommendation communities in artificial immune systems, in: Proc. 1st Int. Conf. on Artificial Immune Systems (Canterbury, UK), pp. 154–160.

    Google Scholar 

  • Cuppens, F. et al., 2002, Correlation in an intrusion process, Internet Security Communication Workshop (SECI’02).

    Google Scholar 

  • Dasgupta, D., ed., 1999, Artificial Immune Systems and Their Applications, Springer, Berlin.

    MATH  Google Scholar 

  • Dasgupta, D., Gonzalez, F., 2002, An immunity-based technique to characterize intrusions in computer networks, IEEE Trans. Evol. Comput. 6:1081–1088.

    Google Scholar 

  • de Castro, L. N. and Von Zuben, F. J., 2002, Learning and optimization using the clonal selection principle, IEEE Trans. Evol Comput., Special issue on artificial immune systems, 6:239–251.

    Article  Google Scholar 

  • Esponda, F., Forrest, S. and Helman, P., 2004, A formal framework for positive and negative detection, IEEE Trans. Syst., Man Cybernet., 34:357–373.

    Article  Google Scholar 

  • Farmer, J. D., Packard, N. H. and Perelson, A. S., 1986, The immune system, adaptation, and machine learning, Physica 22:187–204.

    MathSciNet  Google Scholar 

  • Forrest, S., Perelson, A. S., Allen, L. and Cherukuri, R., 1994, Self-nonself discrimination in a computer, in: Proc. IEEE Symp. on Research in Security and Privacy, (Oakland, CA), pp. 202–212.

    Google Scholar 

  • Hightower, R. R., Forrest, S. and Perelson, A. S., 1995, The evolution of emergent organization in immune system gene libraries, Proc. 6th Conf on Genetic Algorithms, pp. 344–350.

    Google Scholar 

  • Hoagland, J. and Staniford, S., 2002, Viewing Intrusion Detection Systems Alerts: Lessons from SnortSnarf, http://www.silicondefense.com/software/snortsnarf

    Google Scholar 

  • Hofmeyr, S. and Forrest, S., 2000, Architecture for an artificial immune systems, Evol. Comput. 7:1289–1296.

    Google Scholar 

  • Jerne, N. K., 1973, Towards a network theory of the immune system, Ann. Immunol. 125:373–389.

    Google Scholar 

  • Kim, J. and Bentley, P., 1999, The artificial immune model for network intrusion detection, Proc. 7th Eur. Congress on Intelligent Techniques and Soft Computing (EUFIT’99).

    Google Scholar 

  • Kim, J. and Bentley, P., 2001, Evaluating negative selection in an artificial immune systems for network intrusion detection, Proc. Genetic and Evolutionary Computation Conf 2001, pp. 1330–1337.

    Google Scholar 

  • Kim, J. and Bentley, P., 2002, Towards an artificial immune systems for network intrusion detection: an investigation of dynamic clonal selection, Proc. Congress on Evolutionary Computation 2002, pp. 1015–1020.

    Google Scholar 

  • Kubi, J., 2002, Kubi Immunology, 5th edn, Richard A. Goldsby, Thomas J. Kindt and Barbara A. Osborne, eds, Freeman, San Francisco.

    Google Scholar 

  • Matzinger, P., 2003, http://cmmg.biosci.wayne.edu/asg/polly.html

    Google Scholar 

  • Matzinger, P., 2001, The danger model in its historical context, Scand J. Immunol 54:4–9.

    Article  Google Scholar 

  • Matzinger, P., 1994, Tolerance, danger and the extended family, Ann. Rev. Immunol. 12:991–1045.

    Google Scholar 

  • Morrison, T. and Aickelin, U., 2002, An artificial immune system as a recommender system for web sites, in: Proc. 1st Int. Conf. on Artificial Immune Systems (ICARIS-2002) (Canterbury, UK), pp. 161–169.

    Google Scholar 

  • Ning, P., Cui, Y. and Reeves, S., 2002, Constructing attack scenarios through correlation of intrusion alerts, in: Proc. 9th ACM Conf. on Computer and Communications Security, pp. 245–254.

    Google Scholar 

  • Perelson, A. S. and Weisbuch, G., 1997, Immunology for physicists, Rev. Mod. Phys. 69:1219–1267.

    Article  Google Scholar 

  • Resnick, P. and Varian, H. R., 1997, Recommender systems, Commun. ACM 40:56–58.

    Article  Google Scholar 

  • Valdes, A. and Skinner, K., 2001, Probabilistic alert correlation, Proc. RAID’2001, pp. 54–68.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Aickelin, U., Dasgupta, D. (2005). Artificial Immune Systems. In: Burke, E.K., Kendall, G. (eds) Search Methodologies. Springer, Boston, MA. https://doi.org/10.1007/0-387-28356-0_13

Download citation

Publish with us

Policies and ethics