Artificial Immune System Algorithm based on Danger Theory
نویسنده
چکیده
An artificial immune system algorithm, based on the Danger Theory, is an algorithm which emulates, in a computational context, the defense mechanism of the human immune system when presented with a danger to its wellbeing. Over its evolution the human immune system has developed a complex defense mechanism against entities which are harmful to the human body. This system is divided into two sub-systems that provide different types of defense, the innate immune system that is activated by generic (learned through evolution) harmful entities to the human body, and the adaptive immune system which is activated by specific antigens (molecules which are recognized as dangerous by the immune system). The capacity of the human immune system to flexibly and efficiently respond to threats in the human body is the main inspiration for its artificial intelligence conceptualizations. The study of this system has led researchers to formulate several theories regarding how the immune system works. However, the one we are addressing is the Danger Theory, which was introduced by Matzinger [11, 12] and offered a new perspective to the conceptualization and understanding of the immune system. This model is controversial but it provides answers to several of the problems faced by the previous ones, such as transplant rejections, no immune responses to the body in puberty or spontaneous tumor rejection. The main difference to previous models is that the immune system adapts to a changing self and is activated when it detects danger and not just when in the presence of non-self antigens as previous models proposed. Based on these concepts there are two main ideas behind algorithms using this model:
منابع مشابه
STLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملA Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus
According to the propagation and destruction characteristics of mobile phone viruses, a virus detection model based on the Danger Theory is proposed. This model includes four phases: danger capture, antigen presentation, antibody generation and antibody distribution. In this model, local knowledge of mobile phones is exploited by the agents that are running in mobile phones to discover danger c...
متن کاملSHADuDT: Secure hypervisor-based anomaly detection using danger theory
Intrusion Detection based upon learning methods is an attractive approach in research community. These researches have two critical concerns: secure information gathering and accurate detection method. Here we used system calls together with their arguments as a suitable pattern for describing behavior of each process. In security applications, these patterns must be collected safely, so we pro...
متن کاملA Danger-Theory-Based Immune Network Optimization Algorithm
Existing artificial immune optimization algorithms reflect a number of shortcomings, such as premature convergence and poor local search ability. This paper proposes a danger-theory-based immune network optimization algorithm, named dt-aiNet. The danger theory emphasizes that danger signals generated from changes of environments will guide different levels of immune responses, and the areas aro...
متن کاملIntrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory
Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune s...
متن کامل