SlideShare a Scribd company logo
1 of 56
Artificial Immune Systems: An
Emerging Technology
Dr. Jonathan Timmis
Computing Laboratory
University of Kent at Canterbury
England. UK.
J.Timmis@ukc.ac.uk
http:/www.cs.ukc.ac.uk/people/staff/jt6
Congress on Evolutionary Computation 2001.
Seoul, Korea.
CEC 2001 Artificial Immune Systems
Tutorial Overview
What are Artificial Immune Systems?
Background immunology
Why use the immune system as a metaphor
Immune Metaphors employed
Review of AIS work
Applications
More blue sky research
CEC 2001 Artificial Immune Systems
Immune metaphors
Immune System
Idea! Idea ‘
Other areas
Artificial Immune
Systems
CEC 2001 Artificial Immune Systems
Artificial Immune Systems
Relatively new branch of computer science
Some history
Using natural immune system as a metaphor for
solving computational problems
Not modelling the immune system
Variety of applications so far …
Fault diagnosis (Ishida)
Computer security (Forrest, Kim)
Novelty detection (Dasgupta)
Robot behaviour (Lee)
Machine learning (Hunt, Timmis, de Castro)
CEC 2001 Artificial Immune Systems
Why the Immune System?
Recognition
Anomaly detection
Noise tolerance
Robustness
Feature extraction
Diversity
Reinforcement learning
Memory
Distributed
Multi-layered
Adaptive
CEC 2001 Artificial Immune Systems
Part I – Basic Immunology
CEC 2001 Artificial Immune Systems
Role of the Immune System
Protect our bodies from infection
Primary immune response
Launch a response to invading pathogens
Secondary immune response
Remember past encounters
Faster response the second time around
CEC 2001 Artificial Immune Systems
How does it work?
CEC 2001 Artificial Immune Systems
Where is it?
Lymphatic vessels
Lymph nodes
Thymus
Spleen
Tonsils and
adenoids
Bone marrow
Appendix
Peyer’s patches
Primary lymphoid
organs
Secondary lymphoid
organs
CEC 2001 Artificial Immune Systems
Multiple layers of the immune
system
Phagocyte
Adaptive
immune
response
Lymphocytes
Innate
immune
response
Biochemical
barriers
Skin
Pathogens
CEC 2001 Artificial Immune Systems
Immune Pattern Recognition
The immune recognition is based on the complementarity
between the binding region of the receptor and a portion of
the antigen called epitope.
Antibodies present a single type of receptor, antigens
might present several epitopes.
This means that different antibodies can recognize a single antigen
B-cell
BCR or Antibody
Epitopes
B-cell Receptors (Ab)
Antigen
CEC 2001 Artificial Immune Systems
Antibodies
Antigen binding sites
VH
VL
CH CH
VL
CL
CH
VH
CH
CL
Fc
Fab
Fab
Antibody Molecule
... ... ...
V V
D D J J C
Gene rearrangement
Rearranged DNA
V D J C
Transcription
RNA
V D J C
Splicing
mRNA
V D J C
Translation
Heavy chain of an immunoglobulin
Antibody Production
CEC 2001 Artificial Immune Systems
Clonal Selection
Foreign antigens
Proliferation
(Cloning)
Differentiation
Plasma cells
Memory cells
Selection
M
M
Antibody
Self-antigen
Self-antigen
Clonal deletion
(negative selection)
Clonal deletion
(negative selection)
CEC 2001 Artificial Immune Systems
T-cells
Regulation of other cells
Active in the immune response
Helper T-cells
Killer T-cells
T-cell
TCR
CEC 2001 Artificial Immune Systems
Main Properties of Clonal
Selection (Burnet, 1978)
Elimination of self antigens
Proliferation and differentiation on contact of matu
lymphocytes with antigen
Restriction of one pattern to one differentiated cell an
retention of that pattern by clonal descendants;
Generation of new random genetic change
subsequently expressed as diverse antibody patterns b
a form of accelerated somatic mutation
CEC 2001 Artificial Immune Systems
Reinforcement Learning and
Immune Memory
Repeated exposure to an antigen throughout
a lifetime
Primary, secondary immune responses
Remembers encounters
No need to start from scratch
Memory cells
Associative memory
CEC 2001 Artificial Immune Systems
Learning (2)
Antigen Ag1
Antigens
Ag1, Ag2
Primary Response Secondary Response
Lag
Response
to Ag1
Antibody
Concentration
Time
Lag
Response
to Ag2
Response
to Ag1
...
...
Cross-Reactive
Response
...
...
Antigen
Ag1 + Ag3
Response to
Ag1 + Ag3
Lag
CEC 2001 Artificial Immune Systems
Immune Network Theory
Idiotypic network (Jerne, 1974)
B cells co-stimulate each other
Treat each other a bit like antigens
Creates an immunological memory
1
2
3
Ag
Activation
Positive response
Suppression
Negative response
Antibody
Paratope
Idiotope
CEC 2001 Artificial Immune Systems
Immune Network Theory(2)
CEC 2001 Artificial Immune Systems
Shape Space Formalism
Repertoire of the
immune system is
complete (Perelson, 1989)
Extensive regions of
complementarity
Some threshold of
recognition
e
Ve
e
Ve
e
Ve
V







CEC 2001 Artificial Immune Systems
Self/Non-Self Recognition
Immune system needs to be able to
differentiate between self and non-self cells
Antigenic encounters may result in cell
death, therefore
Some kind of positive selection
Some element of negative selection
CEC 2001 Artificial Immune Systems
Summary so far ….
Immune system has some remarkable
properties
Pattern recognition
Learning
Memory
So, is it useful?
CEC 2001 Artificial Immune Systems
Some questions for you !
CEC 2001 Artificial Immune Systems
Part II – A Review of Artificial
Immune Systems
CEC 2001 Artificial Immune Systems
Topics to Cover
A few disclaimers …
I can not cover everything as there is a large
amount of work out there
To do so, would be silly 
Proposed general frameworks
Give an overview of significant application
areas and work therein
I am not an expert in all the problem domains
• I would earn more money if I was !
CEC 2001 Artificial Immune Systems
Shape Space
Describe interactions between molecules
Degree of binding between molecules
Complement threshold
Each paratope matches a certain region of
space
Complete repertoire
CEC 2001 Artificial Immune Systems
Representation and Affinities
Representation affects affinity measure
Binary
Integer
Affinity is related to distance
Euclidian
Hamming
Affinity threshold
CEC 2001 Artificial Immune Systems
Basic Immune Models and
Algorithms
Bone Marrow Models
Negative Selection Algorithms
Clonal Selection Algorithm
Somatic Hypermutation
Immune Network Models
CEC 2001 Artificial Immune Systems
Bone Marrow Models
Gene libraries are used to create antibodies from
the bone marrow
Antibody production through a random
concatenation from gene libraries
Simple or complex libraries
An individual genome corresponds to four libraries:
Library 1 Library 2 Library 3 Library 4
A1 A2 A3 A4 A5 A6 A7 A8
A3 D5
C8
B2
A3 D5
C8
B2
A3 B2 C8 D5
= four 16 bit segments
= a 64 bit chain
Expressed Ab molecule
B1 B2 B3 B4 B5 B6 B7 B8 C1 C2 C3 C4 C5 C6 C7 C8 D1 D2 D3 D4 D5 D6 D7 D8
CEC 2001 Artificial Immune Systems
Negative Selection Algorithms
Forrest 1994: Idea taken from the negative
selection of T-cells in the thymus
Applied initially to computer security
Split into two parts:
Censoring
Monitoring
Self
strings (S)
Generate
random strings
(R0)
Match Detector
Set (R)
Reject
No
Yes
No
Yes
Detector Set
(R)
Protected
Strings (S)
Match
Non-self
Detected
CEC 2001 Artificial Immune Systems
Negative Selection Algorithm
Each copy of the algorithm is unique, so that each protected location is
provided with a unique set of detectors
Detection is probabilistic, as a consequence of using different sets of
detectors to protect each entity
A robust system should detect any foreign activity rather than looking
for specific known patterns of intrusion.
No prior knowledge of anomaly (non-self) is required
The size of the detector set does not necessarily increase with the
number of strings being protected
The detection probability increases exponentially with the number of
independent detection algorithms
There is an exponential cost to generate detectors with relation to the
number of strings being protected (self).
Solution to the above in D’haeseleer et al. (1996)
CEC 2001 Artificial Immune Systems
Somatic Hypermutation
Mutation rate in proportion to affinity
Very controlled mutation in the natural immune
system
Trade-off between the normalized antibody
affinity D* and its mutation rate ,
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
D*

 = 5
 = 10
 = 20
CEC 2001 Artificial Immune Systems
Immune Network Models
Timmis & Neal, 2000
Used immune network theory as a basis,
proposed the AINE algorithm
Initialize AIN
For each antigen
Present antigen to each ARB in the AIN
Calculate ARB stimulation level
Allocate B cells to ARBs, based on stimulation level
Remove weakest ARBs (ones that do not hold any B cells)
If termination condition met
exit
else
Clone and mutate remaining ARBs
Integrate new ARBs into AIN
CEC 2001 Artificial Immune Systems
Immune Network Models
De Castro & Von Zuben (2000c)
aiNET, based in similar principles
At each iteration step do
For each antigen do
Determine affinity to all network cells
Select n highest affinity network cells
Clone these n selected cells
Increase the affinity of the cells to antigen by reducing the
distance between them (greedy search)
Calculate improved affinity of these n cells
Re-select a number of improved cells and place into matrix M
Remove cells from M whose affinity is below a set threshold
Calculate cell-cell affinity within the network
Remove cells from network whose affinity is below
a certain threshold
Concatenate original network and M to form new network
Determine whole network inter-cell affinities and remove all those
below the set threshold
Replace r% of worst individuals by novel randomly generated ones
Test stopping criterion
CEC 2001 Artificial Immune Systems
Part III - Applications
CEC 2001 Artificial Immune Systems
Anomaly Detection
The normal behavior of a system is often
characterized by a series of observations over
time.
The problem of detecting novelties, or anomalies,
can be viewed as finding deviations of a
characteristic property in the system.
For computer scientists, the identification of
computational viruses and network intrusions is
considered one of the most important anomaly
detection tasks
CEC 2001 Artificial Immune Systems
Virus Detection
Protect the computer from unwanted viruses
Initial work by Kephart 1994
More of a computer immune system
Detect Anomaly
Scan for known viruses
Capture samples using decoys
Extract Signature(s)
Add signature(s) to databases
Add removal info
to database
Segregate
code/data
Algorithmic
Virus Analysis
Send signals to
neighbor machines
Remove Virus
CEC 2001 Artificial Immune Systems
Virus Detection (2)
Okamoto & Ishida (1999a,b) proposed a
distributed approach
Detected viruses by matching self-information
first few bytes of the head of a file
the file size and path, etc.
against the current host files.
Viruses were neutralized by overwriting the self-
information on the infected files
Recovering was attained by copying the same file
from other uninfected hosts through the computer
network
CEC 2001 Artificial Immune Systems
Virus Detection (3)
Other key works include:
A distributed self adaptive architecture for a computer
virus immune system (Lamont, 200)
Use a set of co-operating agents to detect non-self
patterns
Immune System Computational System
Pathogens (antigens) Computer viruses
B-, T-cells and antibodies Detectors
Proteins Strings
Antibody/antigen binding Pattern matching
CEC 2001 Artificial Immune Systems
Security
Somayaji et al. (1997) outlined mappings
between IS and computer systems
A security systems need
Confidentiality
Integrity
Availability
Accountability
Correctness
CEC 2001 Artificial Immune Systems
IS to Security Systems
Immune System Network Environment
Static Data
Self Uncorrupted data
Non-self Any change to self
Active Processes on Single Host
Cell Active process in a computer
Multicellular organism Computer running multiple processes
Population of organisms Set of networked computers
Skin and innate immunity Security mechanisms, like passwords, groups, file
permissions, etc.
Adaptive immunity Lymphocyte process able to query other processes to seek for
abnormal behaviors
Autoimmune response False alarm
Self Normal behavior
Non-self Abnormal behavior
Network of Mutually Trusting Computers
Organ in an animal Each computer in a network environment
CEC 2001 Artificial Immune Systems
Network Security
Hofmeyr & Forrest (1999, 2000):
developing an artificial immune system that
is distributed, robust, dynamic, diverse and
adaptive, with applications to computer
network security.
Kim & Bentley (1999). New paper here at
CEC so I won’t cover it, go see it for
yourself!
CEC 2001 Artificial Immune Systems
Forrests Model
AIS for computer network security. (a) Architecture. (b) Life cycle of a detec
Datapath triple
(20.20.15.7, 31.14.22.87,
ftp)
Broadcast LAN
ip: 31.14.22.87
port: 2000
Internal
host
External
host
ip: 20.20.15.7
port: 22
Host
Activation
threshold
Cytokine
level
Permutation
mask
Detector
set
immature
memory activated matches
0100111010101000110......101010010
Detector
Randomly
created
Immature
Mature & Naive
Death
Activated
Memory
No match during
tolerization
010011100010.....001101
Exceed
activation
threshold
Don’t
exceed
activation
threshold
No
co stimulation
Co stimulation
Match
Match
during
tolerization
CEC 2001 Artificial Immune Systems
Novelty Detection
Image Segmentation :
McCoy & Devarajan
(1997)
Detecting road
contours in aerial
images
Used a negative
selection algorithm
1. Generate random detectors
2. Apply these detectors to the sample data
3. Delete any detector misclassifying the sample data
4. Apply remaining detectors to the test image. Note pixels where a new
detector responds better than any previous detector
5. If enough pixels found improved detectors, go to Step 1
6. Output classified image
CEC 2001 Artificial Immune Systems
Hardware Fault Tolerance
Immunotronics (Bradley & Tyrell, 2000)
Use negative selection algorithm for fault
tolerance in hardware
Immune System Hardware Fault Tolerance
Recognition of self Recognition of valid state/state transition
Recognition of non-self Recognition of invalid state/state transition
Learning Learning correct states and transitions
Humoral immunity Error detection and recovery
Clonal deletion Isolation of self-recognizing tolerance conditions
Inactivation of antigen Return to normal operation
Life of an organism Operation lifetime of a hardware
CEC 2001 Artificial Immune Systems
Machine Learning
Early work on DNA Recognition
Cooke and Hunt, 1995
Use immune network theory
Evolve a structure to use for prediction of DNA
sequences
90% classification rate
Quite good at the time, but needed more
corroboration of results
CEC 2001 Artificial Immune Systems
Unsupervised Learning
Timmis, 2000
Based on Hunts work
Complete redesign of algorithm: AINE
Immune metadynamics
Shape space
Few initial parameters
Stabilises to find a core pattern within a
network of B cells
CEC 2001 Artificial Immune Systems
Results (Timmis, 2000)
CEC 2001 Artificial Immune Systems
Another approach
de Castro and von Zuben, 2000
aiNET cf. SOFM
Use similar ideas to Timmis
• Immune network theory
• Shape space
Suppression mechanism different
• Eliminate self similar cells under a set threshold
Clone based on antigen match, network not
taken into account
CEC 2001 Artificial Immune Systems
Results (de Castro & von Zuben,
2001)
Test Problem Result from aiNET
CEC 2001 Artificial Immune Systems
Supervised Approach
Carter, 2000
Pattern recognition and classification system:
Immunos-81
Use T-cells, B-cells, antibodies and amino-acid
library
Builds a library of data types and classes
System can generalise
Good classification rates on sample data sets
CEC 2001 Artificial Immune Systems
Robotics
Behaviour Arbitration
Ishiguro et al. (1996, 1997)
: Immune network theory to
evolve a behaviour among
a set of agents
Collective Behaviour
Emerging collective
behaviour through
communicating robots (Jun
et al, 1999)
Immune network theory to
suppress or encourage
robots behaviour
Garbage
Robot
Garbage can
Battery charger
Far
Middle
Near
Desirable Interacting antibodies
condition and degree of interaction
Action
Paratope Idiotope
CEC 2001 Artificial Immune Systems
Scheduling
Hart et al. (1998) and Hart & Ross (1999a)
Proposed an AIS to produce robust schedules
for a dynamic job-shop scheduling problem in which jobs arrive
continually, and the environment is subject to changes.
Investigated is an AIS could be evolved using a GA
approach
then be used to produce sets of schedules which together cover a
range of contingencies, predictable and unpredictable.
Model included evolution through gene libraries, affinity
maturation of the immune response and the clonal
selection principle.
CEC 2001 Artificial Immune Systems
Diagnosis
Ishida (1993)
Immune network model applied to the process diagnosis
problem
Later was elaborated as a sensor network that could
diagnose sensor faults by evaluating reliability of data
from sensors, and process faults by evaluating reliability of
constraints among data.
Main immune features employed:
Recognition is performed by distributed agents which dynamically
interact with each other;
Each agent reacts based solely on its own knowledge; and
Memory is realized as stable equilibrium points of the dynamical
network.
CEC 2001 Artificial Immune Systems
Summary
Covered much, but there is much work not
covered (so apologies to anyone for missing theirs)
Immunology
Immune metaphors
Antibodies and their interactions
Immune learning and memory
Self/non-self
• Negative selection
Application of immune metaphors
CEC 2001 Artificial Immune Systems
The Future
Rapidly growing field that I think is very
exciting
Much work is very diverse
Need of a general framework
Wide possible application domains
Lots of work to do …. Keep me in a job for
quite a while yet 

More Related Content

Similar to cec2001-tutorial.ppt

conventional Vs. tactile computing
conventional Vs. tactile computingconventional Vs. tactile computing
conventional Vs. tactile computing
harish kumar
 
Cuckoo search algorithm
Cuckoo search algorithmCuckoo search algorithm
Cuckoo search algorithm
Ritesh Kumar
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
UltraUploader
 

Similar to cec2001-tutorial.ppt (20)

CDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part bCDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part b
 
2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detection
 
scRNA-Seq Workshop Presentation - Stem Cell Network 2018
scRNA-Seq Workshop Presentation - Stem Cell Network 2018scRNA-Seq Workshop Presentation - Stem Cell Network 2018
scRNA-Seq Workshop Presentation - Stem Cell Network 2018
 
Synthetic Biology
Synthetic BiologySynthetic Biology
Synthetic Biology
 
Antibody engineering
Antibody engineeringAntibody engineering
Antibody engineering
 
conventional Vs. tactile computing
conventional Vs. tactile computingconventional Vs. tactile computing
conventional Vs. tactile computing
 
Cuckoo search algorithm
Cuckoo search algorithmCuckoo search algorithm
Cuckoo search algorithm
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
 
Bio Inspired Computing Final Version
Bio Inspired Computing Final VersionBio Inspired Computing Final Version
Bio Inspired Computing Final Version
 
Prof. Mark Coles (Oxford University) - Data-driven systems medicine
Prof. Mark Coles (Oxford University) - Data-driven systems medicineProf. Mark Coles (Oxford University) - Data-driven systems medicine
Prof. Mark Coles (Oxford University) - Data-driven systems medicine
 
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
 
Microarray Analysis
Microarray AnalysisMicroarray Analysis
Microarray Analysis
 
IsoPlexis Trifold
IsoPlexis TrifoldIsoPlexis Trifold
IsoPlexis Trifold
 
Large scale machine learning challenges for systems biology
Large scale machine learning challenges for systems biologyLarge scale machine learning challenges for systems biology
Large scale machine learning challenges for systems biology
 
Flow basics2.ppt2
Flow basics2.ppt2Flow basics2.ppt2
Flow basics2.ppt2
 
Petar Petrov MSc thesis defense
Petar Petrov MSc thesis defensePetar Petrov MSc thesis defense
Petar Petrov MSc thesis defense
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
 
A Beginner’S Guide To Simulation In Immunology
A Beginner’S Guide To Simulation In ImmunologyA Beginner’S Guide To Simulation In Immunology
A Beginner’S Guide To Simulation In Immunology
 
Membrane computing
Membrane computingMembrane computing
Membrane computing
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 

cec2001-tutorial.ppt

  • 1. Artificial Immune Systems: An Emerging Technology Dr. Jonathan Timmis Computing Laboratory University of Kent at Canterbury England. UK. J.Timmis@ukc.ac.uk http:/www.cs.ukc.ac.uk/people/staff/jt6 Congress on Evolutionary Computation 2001. Seoul, Korea.
  • 2. CEC 2001 Artificial Immune Systems Tutorial Overview What are Artificial Immune Systems? Background immunology Why use the immune system as a metaphor Immune Metaphors employed Review of AIS work Applications More blue sky research
  • 3. CEC 2001 Artificial Immune Systems Immune metaphors Immune System Idea! Idea ‘ Other areas Artificial Immune Systems
  • 4. CEC 2001 Artificial Immune Systems Artificial Immune Systems Relatively new branch of computer science Some history Using natural immune system as a metaphor for solving computational problems Not modelling the immune system Variety of applications so far … Fault diagnosis (Ishida) Computer security (Forrest, Kim) Novelty detection (Dasgupta) Robot behaviour (Lee) Machine learning (Hunt, Timmis, de Castro)
  • 5. CEC 2001 Artificial Immune Systems Why the Immune System? Recognition Anomaly detection Noise tolerance Robustness Feature extraction Diversity Reinforcement learning Memory Distributed Multi-layered Adaptive
  • 6. CEC 2001 Artificial Immune Systems Part I – Basic Immunology
  • 7. CEC 2001 Artificial Immune Systems Role of the Immune System Protect our bodies from infection Primary immune response Launch a response to invading pathogens Secondary immune response Remember past encounters Faster response the second time around
  • 8. CEC 2001 Artificial Immune Systems How does it work?
  • 9. CEC 2001 Artificial Immune Systems Where is it? Lymphatic vessels Lymph nodes Thymus Spleen Tonsils and adenoids Bone marrow Appendix Peyer’s patches Primary lymphoid organs Secondary lymphoid organs
  • 10. CEC 2001 Artificial Immune Systems Multiple layers of the immune system Phagocyte Adaptive immune response Lymphocytes Innate immune response Biochemical barriers Skin Pathogens
  • 11. CEC 2001 Artificial Immune Systems Immune Pattern Recognition The immune recognition is based on the complementarity between the binding region of the receptor and a portion of the antigen called epitope. Antibodies present a single type of receptor, antigens might present several epitopes. This means that different antibodies can recognize a single antigen B-cell BCR or Antibody Epitopes B-cell Receptors (Ab) Antigen
  • 12. CEC 2001 Artificial Immune Systems Antibodies Antigen binding sites VH VL CH CH VL CL CH VH CH CL Fc Fab Fab Antibody Molecule ... ... ... V V D D J J C Gene rearrangement Rearranged DNA V D J C Transcription RNA V D J C Splicing mRNA V D J C Translation Heavy chain of an immunoglobulin Antibody Production
  • 13. CEC 2001 Artificial Immune Systems Clonal Selection Foreign antigens Proliferation (Cloning) Differentiation Plasma cells Memory cells Selection M M Antibody Self-antigen Self-antigen Clonal deletion (negative selection) Clonal deletion (negative selection)
  • 14. CEC 2001 Artificial Immune Systems T-cells Regulation of other cells Active in the immune response Helper T-cells Killer T-cells T-cell TCR
  • 15. CEC 2001 Artificial Immune Systems Main Properties of Clonal Selection (Burnet, 1978) Elimination of self antigens Proliferation and differentiation on contact of matu lymphocytes with antigen Restriction of one pattern to one differentiated cell an retention of that pattern by clonal descendants; Generation of new random genetic change subsequently expressed as diverse antibody patterns b a form of accelerated somatic mutation
  • 16. CEC 2001 Artificial Immune Systems Reinforcement Learning and Immune Memory Repeated exposure to an antigen throughout a lifetime Primary, secondary immune responses Remembers encounters No need to start from scratch Memory cells Associative memory
  • 17. CEC 2001 Artificial Immune Systems Learning (2) Antigen Ag1 Antigens Ag1, Ag2 Primary Response Secondary Response Lag Response to Ag1 Antibody Concentration Time Lag Response to Ag2 Response to Ag1 ... ... Cross-Reactive Response ... ... Antigen Ag1 + Ag3 Response to Ag1 + Ag3 Lag
  • 18. CEC 2001 Artificial Immune Systems Immune Network Theory Idiotypic network (Jerne, 1974) B cells co-stimulate each other Treat each other a bit like antigens Creates an immunological memory 1 2 3 Ag Activation Positive response Suppression Negative response Antibody Paratope Idiotope
  • 19. CEC 2001 Artificial Immune Systems Immune Network Theory(2)
  • 20. CEC 2001 Artificial Immune Systems Shape Space Formalism Repertoire of the immune system is complete (Perelson, 1989) Extensive regions of complementarity Some threshold of recognition e Ve e Ve e Ve V       
  • 21. CEC 2001 Artificial Immune Systems Self/Non-Self Recognition Immune system needs to be able to differentiate between self and non-self cells Antigenic encounters may result in cell death, therefore Some kind of positive selection Some element of negative selection
  • 22. CEC 2001 Artificial Immune Systems Summary so far …. Immune system has some remarkable properties Pattern recognition Learning Memory So, is it useful?
  • 23. CEC 2001 Artificial Immune Systems Some questions for you !
  • 24. CEC 2001 Artificial Immune Systems Part II – A Review of Artificial Immune Systems
  • 25. CEC 2001 Artificial Immune Systems Topics to Cover A few disclaimers … I can not cover everything as there is a large amount of work out there To do so, would be silly  Proposed general frameworks Give an overview of significant application areas and work therein I am not an expert in all the problem domains • I would earn more money if I was !
  • 26. CEC 2001 Artificial Immune Systems Shape Space Describe interactions between molecules Degree of binding between molecules Complement threshold Each paratope matches a certain region of space Complete repertoire
  • 27. CEC 2001 Artificial Immune Systems Representation and Affinities Representation affects affinity measure Binary Integer Affinity is related to distance Euclidian Hamming Affinity threshold
  • 28. CEC 2001 Artificial Immune Systems Basic Immune Models and Algorithms Bone Marrow Models Negative Selection Algorithms Clonal Selection Algorithm Somatic Hypermutation Immune Network Models
  • 29. CEC 2001 Artificial Immune Systems Bone Marrow Models Gene libraries are used to create antibodies from the bone marrow Antibody production through a random concatenation from gene libraries Simple or complex libraries An individual genome corresponds to four libraries: Library 1 Library 2 Library 3 Library 4 A1 A2 A3 A4 A5 A6 A7 A8 A3 D5 C8 B2 A3 D5 C8 B2 A3 B2 C8 D5 = four 16 bit segments = a 64 bit chain Expressed Ab molecule B1 B2 B3 B4 B5 B6 B7 B8 C1 C2 C3 C4 C5 C6 C7 C8 D1 D2 D3 D4 D5 D6 D7 D8
  • 30. CEC 2001 Artificial Immune Systems Negative Selection Algorithms Forrest 1994: Idea taken from the negative selection of T-cells in the thymus Applied initially to computer security Split into two parts: Censoring Monitoring Self strings (S) Generate random strings (R0) Match Detector Set (R) Reject No Yes No Yes Detector Set (R) Protected Strings (S) Match Non-self Detected
  • 31. CEC 2001 Artificial Immune Systems Negative Selection Algorithm Each copy of the algorithm is unique, so that each protected location is provided with a unique set of detectors Detection is probabilistic, as a consequence of using different sets of detectors to protect each entity A robust system should detect any foreign activity rather than looking for specific known patterns of intrusion. No prior knowledge of anomaly (non-self) is required The size of the detector set does not necessarily increase with the number of strings being protected The detection probability increases exponentially with the number of independent detection algorithms There is an exponential cost to generate detectors with relation to the number of strings being protected (self). Solution to the above in D’haeseleer et al. (1996)
  • 32. CEC 2001 Artificial Immune Systems Somatic Hypermutation Mutation rate in proportion to affinity Very controlled mutation in the natural immune system Trade-off between the normalized antibody affinity D* and its mutation rate , 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 D*   = 5  = 10  = 20
  • 33. CEC 2001 Artificial Immune Systems Immune Network Models Timmis & Neal, 2000 Used immune network theory as a basis, proposed the AINE algorithm Initialize AIN For each antigen Present antigen to each ARB in the AIN Calculate ARB stimulation level Allocate B cells to ARBs, based on stimulation level Remove weakest ARBs (ones that do not hold any B cells) If termination condition met exit else Clone and mutate remaining ARBs Integrate new ARBs into AIN
  • 34. CEC 2001 Artificial Immune Systems Immune Network Models De Castro & Von Zuben (2000c) aiNET, based in similar principles At each iteration step do For each antigen do Determine affinity to all network cells Select n highest affinity network cells Clone these n selected cells Increase the affinity of the cells to antigen by reducing the distance between them (greedy search) Calculate improved affinity of these n cells Re-select a number of improved cells and place into matrix M Remove cells from M whose affinity is below a set threshold Calculate cell-cell affinity within the network Remove cells from network whose affinity is below a certain threshold Concatenate original network and M to form new network Determine whole network inter-cell affinities and remove all those below the set threshold Replace r% of worst individuals by novel randomly generated ones Test stopping criterion
  • 35. CEC 2001 Artificial Immune Systems Part III - Applications
  • 36. CEC 2001 Artificial Immune Systems Anomaly Detection The normal behavior of a system is often characterized by a series of observations over time. The problem of detecting novelties, or anomalies, can be viewed as finding deviations of a characteristic property in the system. For computer scientists, the identification of computational viruses and network intrusions is considered one of the most important anomaly detection tasks
  • 37. CEC 2001 Artificial Immune Systems Virus Detection Protect the computer from unwanted viruses Initial work by Kephart 1994 More of a computer immune system Detect Anomaly Scan for known viruses Capture samples using decoys Extract Signature(s) Add signature(s) to databases Add removal info to database Segregate code/data Algorithmic Virus Analysis Send signals to neighbor machines Remove Virus
  • 38. CEC 2001 Artificial Immune Systems Virus Detection (2) Okamoto & Ishida (1999a,b) proposed a distributed approach Detected viruses by matching self-information first few bytes of the head of a file the file size and path, etc. against the current host files. Viruses were neutralized by overwriting the self- information on the infected files Recovering was attained by copying the same file from other uninfected hosts through the computer network
  • 39. CEC 2001 Artificial Immune Systems Virus Detection (3) Other key works include: A distributed self adaptive architecture for a computer virus immune system (Lamont, 200) Use a set of co-operating agents to detect non-self patterns Immune System Computational System Pathogens (antigens) Computer viruses B-, T-cells and antibodies Detectors Proteins Strings Antibody/antigen binding Pattern matching
  • 40. CEC 2001 Artificial Immune Systems Security Somayaji et al. (1997) outlined mappings between IS and computer systems A security systems need Confidentiality Integrity Availability Accountability Correctness
  • 41. CEC 2001 Artificial Immune Systems IS to Security Systems Immune System Network Environment Static Data Self Uncorrupted data Non-self Any change to self Active Processes on Single Host Cell Active process in a computer Multicellular organism Computer running multiple processes Population of organisms Set of networked computers Skin and innate immunity Security mechanisms, like passwords, groups, file permissions, etc. Adaptive immunity Lymphocyte process able to query other processes to seek for abnormal behaviors Autoimmune response False alarm Self Normal behavior Non-self Abnormal behavior Network of Mutually Trusting Computers Organ in an animal Each computer in a network environment
  • 42. CEC 2001 Artificial Immune Systems Network Security Hofmeyr & Forrest (1999, 2000): developing an artificial immune system that is distributed, robust, dynamic, diverse and adaptive, with applications to computer network security. Kim & Bentley (1999). New paper here at CEC so I won’t cover it, go see it for yourself!
  • 43. CEC 2001 Artificial Immune Systems Forrests Model AIS for computer network security. (a) Architecture. (b) Life cycle of a detec Datapath triple (20.20.15.7, 31.14.22.87, ftp) Broadcast LAN ip: 31.14.22.87 port: 2000 Internal host External host ip: 20.20.15.7 port: 22 Host Activation threshold Cytokine level Permutation mask Detector set immature memory activated matches 0100111010101000110......101010010 Detector Randomly created Immature Mature & Naive Death Activated Memory No match during tolerization 010011100010.....001101 Exceed activation threshold Don’t exceed activation threshold No co stimulation Co stimulation Match Match during tolerization
  • 44. CEC 2001 Artificial Immune Systems Novelty Detection Image Segmentation : McCoy & Devarajan (1997) Detecting road contours in aerial images Used a negative selection algorithm 1. Generate random detectors 2. Apply these detectors to the sample data 3. Delete any detector misclassifying the sample data 4. Apply remaining detectors to the test image. Note pixels where a new detector responds better than any previous detector 5. If enough pixels found improved detectors, go to Step 1 6. Output classified image
  • 45. CEC 2001 Artificial Immune Systems Hardware Fault Tolerance Immunotronics (Bradley & Tyrell, 2000) Use negative selection algorithm for fault tolerance in hardware Immune System Hardware Fault Tolerance Recognition of self Recognition of valid state/state transition Recognition of non-self Recognition of invalid state/state transition Learning Learning correct states and transitions Humoral immunity Error detection and recovery Clonal deletion Isolation of self-recognizing tolerance conditions Inactivation of antigen Return to normal operation Life of an organism Operation lifetime of a hardware
  • 46. CEC 2001 Artificial Immune Systems Machine Learning Early work on DNA Recognition Cooke and Hunt, 1995 Use immune network theory Evolve a structure to use for prediction of DNA sequences 90% classification rate Quite good at the time, but needed more corroboration of results
  • 47. CEC 2001 Artificial Immune Systems Unsupervised Learning Timmis, 2000 Based on Hunts work Complete redesign of algorithm: AINE Immune metadynamics Shape space Few initial parameters Stabilises to find a core pattern within a network of B cells
  • 48. CEC 2001 Artificial Immune Systems Results (Timmis, 2000)
  • 49. CEC 2001 Artificial Immune Systems Another approach de Castro and von Zuben, 2000 aiNET cf. SOFM Use similar ideas to Timmis • Immune network theory • Shape space Suppression mechanism different • Eliminate self similar cells under a set threshold Clone based on antigen match, network not taken into account
  • 50. CEC 2001 Artificial Immune Systems Results (de Castro & von Zuben, 2001) Test Problem Result from aiNET
  • 51. CEC 2001 Artificial Immune Systems Supervised Approach Carter, 2000 Pattern recognition and classification system: Immunos-81 Use T-cells, B-cells, antibodies and amino-acid library Builds a library of data types and classes System can generalise Good classification rates on sample data sets
  • 52. CEC 2001 Artificial Immune Systems Robotics Behaviour Arbitration Ishiguro et al. (1996, 1997) : Immune network theory to evolve a behaviour among a set of agents Collective Behaviour Emerging collective behaviour through communicating robots (Jun et al, 1999) Immune network theory to suppress or encourage robots behaviour Garbage Robot Garbage can Battery charger Far Middle Near Desirable Interacting antibodies condition and degree of interaction Action Paratope Idiotope
  • 53. CEC 2001 Artificial Immune Systems Scheduling Hart et al. (1998) and Hart & Ross (1999a) Proposed an AIS to produce robust schedules for a dynamic job-shop scheduling problem in which jobs arrive continually, and the environment is subject to changes. Investigated is an AIS could be evolved using a GA approach then be used to produce sets of schedules which together cover a range of contingencies, predictable and unpredictable. Model included evolution through gene libraries, affinity maturation of the immune response and the clonal selection principle.
  • 54. CEC 2001 Artificial Immune Systems Diagnosis Ishida (1993) Immune network model applied to the process diagnosis problem Later was elaborated as a sensor network that could diagnose sensor faults by evaluating reliability of data from sensors, and process faults by evaluating reliability of constraints among data. Main immune features employed: Recognition is performed by distributed agents which dynamically interact with each other; Each agent reacts based solely on its own knowledge; and Memory is realized as stable equilibrium points of the dynamical network.
  • 55. CEC 2001 Artificial Immune Systems Summary Covered much, but there is much work not covered (so apologies to anyone for missing theirs) Immunology Immune metaphors Antibodies and their interactions Immune learning and memory Self/non-self • Negative selection Application of immune metaphors
  • 56. CEC 2001 Artificial Immune Systems The Future Rapidly growing field that I think is very exciting Much work is very diverse Need of a general framework Wide possible application domains Lots of work to do …. Keep me in a job for quite a while yet 