Artificial Immune System Algorithm based on Danger Theory

نویسنده

  • Gonçalo Pereira
چکیده

An artificial immune system algorithm, based on the Danger Theory, is an algorithm which emulates, in a computational context, the defense mechanism of the human immune system when presented with a danger to its wellbeing. Over its evolution the human immune system has developed a complex defense mechanism against entities which are harmful to the human body. This system is divided into two sub-systems that provide different types of defense, the innate immune system that is activated by generic (learned through evolution) harmful entities to the human body, and the adaptive immune system which is activated by specific antigens (molecules which are recognized as dangerous by the immune system). The capacity of the human immune system to flexibly and efficiently respond to threats in the human body is the main inspiration for its artificial intelligence conceptualizations. The study of this system has led researchers to formulate several theories regarding how the immune system works. However, the one we are addressing is the Danger Theory, which was introduced by Matzinger [11, 12] and offered a new perspective to the conceptualization and understanding of the immune system. This model is controversial but it provides answers to several of the problems faced by the previous ones, such as transplant rejections, no immune responses to the body in puberty or spontaneous tumor rejection. The main difference to previous models is that the immune system adapts to a changing self and is activated when it detects danger and not just when in the presence of non-self antigens as previous models proposed. Based on these concepts there are two main ideas behind algorithms using this model:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus

According to the propagation and destruction characteristics of mobile phone viruses, a virus detection model based on the Danger Theory is proposed. This model includes four phases: danger capture, antigen presentation, antibody generation and antibody distribution. In this model, local knowledge of mobile phones is exploited by the agents that are running in mobile phones to discover danger c...

متن کامل

SHADuDT: Secure hypervisor-based anomaly detection using danger theory

Intrusion Detection based upon learning methods is an attractive approach in research community. These researches have two critical concerns: secure information gathering and accurate detection method. Here we used system calls together with their arguments as a suitable pattern for describing behavior of each process. In security applications, these patterns must be collected safely, so we pro...

متن کامل

A Danger-Theory-Based Immune Network Optimization Algorithm

Existing artificial immune optimization algorithms reflect a number of shortcomings, such as premature convergence and poor local search ability. This paper proposes a danger-theory-based immune network optimization algorithm, named dt-aiNet. The danger theory emphasizes that danger signals generated from changes of environments will guide different levels of immune responses, and the areas aro...

متن کامل

Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory

Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011