Show simple item record

dc.contributor.authorMiddlemiss, Melanieen_NZ
dc.date.available2011-04-07T03:06:16Z
dc.date.copyright2006-01en_NZ
dc.identifier.citationMiddlemiss, M. (2006). Positive and negative selection in a multilayer artificial immune system (Information Science Discussion Papers Series No. 2006/03). University of Otago. Retrieved from http://hdl.handle.net/10523/1049en
dc.identifier.urihttp://hdl.handle.net/10523/1049
dc.description.abstractThe immune system is a complex and distributed system. It provides a multilayered form of defence, capable of identifying and responding to harmful pathogens that it does not recognise as “self”. The framework proposed in this paper incorporates a number of immunological concepts and principles, including the multilayered defence and the cooperation between cells in the adaptive immune system. An alternative model of positive selection is also presented. It is suggested that the framework discussed here could lead to reduced false positive responses in anomaly detection tasks, such as intrusion detection, as well being extended to a population of computational immune systems that are able to maintain population diversity of recognition and response.en_NZ
dc.format.mimetypeapplication/pdf
dc.publisherUniversity of Otagoen_NZ
dc.relation.ispartofseriesInformation Science Discussion Papers Seriesen_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titlePositive and negative selection in a multilayer artificial immune systemen_NZ
dc.typeDiscussion Paperen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages9en_NZ
otago.date.accession2006-01-18en_NZ
otago.schoolInformation Scienceen_NZ
otago.openaccessOpen
otago.place.publicationDunedin, New Zealanden_NZ
dc.identifier.eprints193en_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesForrest, S., Perelson, A. S., Allen, L. and Cherukuri, R., “Self-Nonself Discrimination in a Computer,” Proc. IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1994, pp. 202–212. Forrest, S., Hofmeyr, S. and Somayaji, A., “Computer Immunology,” Communications of the ACM, vol. 40, no. 10, 1997, pp. 88–96. Kim, J. and Bentley, P., “Negative selection and niching by an artificial immune system for network intrusion detection,” Proc. Late Breaking Papers at the 1999 Genetic and Evolutionary Computation Conference, Edited by Brave, S. and Wu, A. S., Orlando, Florida, USA, 1999, pp. 149–158. Kephart, J. O., “A Biologically Inspired Immune System for Computers,” Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, Cambridge, MA, US: MIT Press, 1994, pp. 130–139. Playfair, J. H. L. and Bancroft G. J., Infection and immunity, Oxford; New York: Oxford University Press, 2004. Matzinger, P., “Tolerance, danger, and the extended family,” Annual Reviews of Immunology, vol. 12, 1994, pp. 991–1045. Matzinger, P., “The danger model: A renewed sense of self,” Science, vol. 296, no. 5566, 2002, pp. 301. Aickelin, U. and Cayzer, S., “The Danger Theory and Its Application to Artificial Immune Systems,” Proc. 1st International Conference on ARtificial Immune Systems (ICARIS-2002), Edited by Timmis, J. and Bentley, Peter, University of Kent at Canterbury, UK, 2002, pp. 141–148. Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J., “Danger Theory: The Link between AIS and IDS?,” Hewlett Packard Labs: HPL-2003-138, 16 July, 2003. Dasgupta, D. and Yu, S., “Artificial Immune Systems: A Bibliography,” CS Technical Report: CS-03-002, Computer Science Division, The University of Memphis, USA, Dec, 2003. de Castro, L. N. and Timmis, J., Artificial Immune Systems: A New Combutational Intelligence Approach, Springer-Verlag, 2002. Dasgupta, D. and Ji, Z. and Gonzalez, F., Artificial Immune System (AIS) Research in the Last Five Years, Proc. Congress on Evolutionary Computation, Edited by Sarker, R. et. al., Canberra, Australia: IEEE Press, 8–12 Dec 2003, pp. 123–130. Dasgupta, D., Yu, S. and Majumdar, N. S., “MILA - Multilevel Immune Learning Algorithm,” Proc. Genetic and Evolutionary Computation Conference, Edited by. Cantu-Paz, E. et. al., Chicago, USA: Springer-Verlag, 2003, pp. 183–194. Cohn, M., “An alternative to current thinking about positive selection, negative selection and activation of T cells,” Immunology, Blackwell Publishing, vol. 111, 2004, pp. 375–380. Janeway, C. and Travers, P., Immunobiology : the immune system in health and disease, Current Biology; London, San Francisco New York: Garland Publishers, 5th Edition, 2001. Lydyard, P. M., Whelan, A. and Fanger, M. W., Immunology, London: Bios Scientific, 2nd Edition, Instant Notes Series, 2004. Somayaji, A., Hofmeyr, S. and Forrest, S., “Principles of a Computer Immune System,” Proc. New Security Paradigms Workshop, Great Langdale, Cumbria, UK, 1997, pp. 75–82. Sompayrac, L., How the immune system works, Malden, Mass.: Blackwell Science, 2nd Edition, 2003. Esponda, F., Forrest, S. and Helman, P., ”A Formal Framework for Positive and Negative Detection Schemes,” IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics, vol. 34, no. 1, 2004, pp. 357–373. Hofmeyr, S. and Forrest, S., “Architecture for an Artificial Immune System,” Evolutionary Computation, vol. 7, no. 1, 2000, pp. 1289–1296. Cohn, M., “Tritope model of restrictive recognition by the TCR,” Trends in Immunology, vol. 24, no. 3, 2003, pp. 127–131. Somayaji, A. and Forrest, S., “Automated Response Using System-Call Delays,” Proc. Usenix, San Diego, California, 2000. Hofmeyr, S. and Forrest, S., “Immunity by Design: An Artificial Immune System,” Proc. Genetic and Evolutionary Computation Conference (GECCO), Edited by. Banzhaf, W. et. al., 1999, pp. 1289–1296. Williams, P., Anchor, K., Bebo, J., Lamont, G. and Gunsch, G., “CDIS: Towards a Computer Immune System for Detecting Network Intrusions,” Lecture Notes in Computer Science, vol. 2212, 2001, pp. 117–133. Kim, J., Ong, A. and Overill, R. E., “Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector,” Proc. Congress on Evolutionary Computation, Edited by. Sarker, R. et. al., Canberra, Australia: IEEE Press, 2003, 405–412. Kendall, K., “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,” Masters Thesis, Massachusetts Institute of Technology, 1999.en_NZ
otago.relation.number2006/03en_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record