SlideShare a Scribd company logo
1 of 28
Download to read offline
Applications of Immune System
Computing
Ricardo Hoar
What kind of applications?
l Computer Security
l Pattern Recognition
l Data Mining and Retrieval
l Multi-Agent Systems
l Design Optimization
l Control Applications
l Robotics
l …
A Distributed Architecture for a Self
Adaptive Computer Virus Immune System
Gary B. Lamont, Robert E. Marmelstein,
and David A. Van Veldhuizen
l Simplified Biological IS Model (BIS)
l Relationships between BIS and CVIS
l CVIS model
l Discussion of some algorithms involved in
CVIS
Simplified Biological IS Model
l Extracellular BIS
– High level set of interacting components:
l Generator/Repressor
– B-cells, antibodies
l Detector
– Detect antigen , detect host/non host
l Classifier
– Once antigen detected, B-cell determines type
l Purger
– Eg. Macrophage , antigen purging or cleansing
l BIS memory
– A store of successful B-cell threat responses
l Adaptation process
– Continual updating in reaction to imperfect coverage of all
pathogens
Extracellular BIS (Diagram)
Intracellular BIS
l Attempts to find antigens within living human cells.
l Generate “Helper” T Cells which can promote antibody
prodection from B cells
l Antigen Presentation
l Major Histocompatability Complex (recognition by T
cells)
Intracellular BIS (Diagram)
Computer Virus
l Significant Computer Threat
l High “birth rate” of new viruses
l Inability of Anti-Virus software to detect the
newest Viruses.
Current Methods for Virus
Scanning
l Current Virus scanning Software looks for bit
patterns known to belong to a specific virus.
Additionally deductive techniques use “rules of
thumb” to identify programs that exhibit “virus
like” behaviors.
l Although reliable , these methods rely on static
knowledge bases, resulting in a the need for
continual updating.
More robust method needed
l Why not apply the principals from immune
computing to this obvious application of
scanning for Viruses?
l Which components of BIS can be used to
define a Computer Virus Immune System ?
l What are the main implementation challenges?
Computer Virus Immune System
l Components
– Genereate/Suppress Virus
l Generate random signatures, Compare signatures to prior sig.
– Classify Virus
l Isolate virus based on its characteristics, signature extraction
– Purge Virus
l Purge the virus and repair damaged system resources
– Augment Virus Database
l If new virus, add to memory
l Main Challenge
– Replicating BIS inherent parallelism
Generic CVIS Algorithm
Self/Non-Self Determination
l Distinguishing legitimate computer resources
from those corrupted by a computer virus
l Accomplished via detectors generated at
random and compared to protected data
l Requires a significant number of detectors
l Can become cumbersome if protecting
changing files due to creation of new detectors
Self/Non-Self Determination Algorithm
Virus Decoy
l Uses decoy programs whose sole purpose is
to become infected
l Infected decoy can automatically extract viral
signature
l Does not require the regeneration with
changing files
l Must be used in conjunction with another
method to identify classified viruses
Virus Decoy Algorithm
Immunity by Design: An Artificial
Immune System
Steven A. Hofmeyr
and Stephanie
Forrest
ARCHITECTURE
l To preserve generality, we represent both the protected
system (self) and infectious agents (nonself) as dynamically
changing sets of bit strings.
l In cells of the body the profile of expressed proteins (self)
changes over time, and likewise, we expect our set of
protected strings to vary over time.
l The body is subjected to different kinds of infections over
time; we can view nonself as a dynamically changing set of
strings.
EXAMPLE: NETWORK
SECURITY
l We define self to be the set of normal pair wise
connections (at the TCP/IP level) between
computers.
l A connection is defined in terms of its “data-path
triple”—the source IP address, the destination IP
address, and the service (or port) by which the
computers communicate. (49 bit string)
l Self signifies recognized familiar addresses while
Non-self represents “foreign” addresses
NETWORK
SECURITY
l Each detector cell is represented by a 49 bit string.
l Detection = String Matching
l New detectors are randomly generated and eliminated
if they are matched while still immature (removal of
self)
l Mature detectors can activate an alarm if a threshold is
reached or be removed if they remain unmatched.
l This balance between naïve immature and mature
cells gives the system adequate adaptability to new
antigens.
The Architecture of the AIS.
Lifecycle of a detector
EXPERIMENTAL RESULTS
l Two data sets were collected:
l The self set was collected over 50 days.
l Self = 1.5 million datapaths mapped to 49-bit binary strings.
l At time 0 in the simulation a synthetic attack was detected
with probability p = 0.23.
l After letting the system respond and adapt for 3 months
attack detected with probability 0.76, demonstrating the
effectiveness of AIS for learning
Combinatorial Optimization (n-TSP
Problem)
l Endo et al. (1998) and Toma et al. (1999) proposed an
adaptive optimization algorithm based on the immune
network model and MHC peptide presentation. In this model,
immune network principles were used to produce adaptive
behaviors of agents and MHC was used to induce
competitive behaviors among agents. The agents possessed a
sensor, mimicking MHC peptide presentation by
macrophages, the T-cells were used to control the behavior
of agents and the B-cells were used to produce behaviors.
Combinatorial Optimization
(n-TSP Problem)
Problem Comparison
Refrences
l de Castro, L, Zuben, F. ARTIFICIAL IMMUNE SYSTEMS: PART II – A
SURVEY OF APPLICATIONS Technical Report DCA-RT 02/00 accessed
from:
http://www.cs.plu.edu/pub/faculty/spillman/seniorprojarts/ids/part2.pdf
l Hofmeyr, S., Forrest S. Immunity by Design: An Artificial Immune System
l Lamont, G., Marmelstein R., Veldhuizen D. A Distributed Architecture for
a Self Adaptive Computer Virus Immune System
New Ideas in Optimization
l Dasgupta, D. Artificial Immune systems: Theory and Applications Tutorial
WCCI 2002, Honolulu Hawaii.

More Related Content

Similar to Applications of immune system computing

An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system forcsandit
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.pptAyushDey1
 
A feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detectionA feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detectionUltraUploader
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionAboul Ella Hassanien
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?Leandro de Castro
 
Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a reviewijfcstjournal
 
Financial security and machine learning
Financial security and machine learningFinancial security and machine learning
Financial security and machine learningMk Kim
 
2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune SystemsLeandro de Castro
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationUltraUploader
 
A distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemA distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemUltraUploader
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Waqas Tariq
 
Automatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detectionAutomatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detectionUltraUploader
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionIOSR Journals
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune SystemsLeandro de Castro
 
Systems Immunology -- 2014
Systems Immunology -- 2014Systems Immunology -- 2014
Systems Immunology -- 2014Yannick Pouliot
 
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample ApplicationsLeandro de Castro
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemIJRES Journal
 

Similar to Applications of immune system computing (20)

An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system for
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.ppt
 
A feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detectionA feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detection
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detection
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
 
Ijetcas14 461
Ijetcas14 461Ijetcas14 461
Ijetcas14 461
 
Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a review
 
Financial security and machine learning
Financial security and machine learningFinancial security and machine learning
Financial security and machine learning
 
2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems
 
Membrane computing
Membrane computingMembrane computing
Membrane computing
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimization
 
A distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemA distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune system
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
 
Automatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detectionAutomatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detection
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant Extraction
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems
 
Systems Immunology -- 2014
Systems Immunology -- 2014Systems Immunology -- 2014
Systems Immunology -- 2014
 
Synthetic Biology
Synthetic BiologySynthetic Biology
Synthetic Biology
 
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manualUltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer virusesUltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 

Applications of immune system computing

  • 1. Applications of Immune System Computing Ricardo Hoar
  • 2. What kind of applications? l Computer Security l Pattern Recognition l Data Mining and Retrieval l Multi-Agent Systems l Design Optimization l Control Applications l Robotics l …
  • 3. A Distributed Architecture for a Self Adaptive Computer Virus Immune System Gary B. Lamont, Robert E. Marmelstein, and David A. Van Veldhuizen l Simplified Biological IS Model (BIS) l Relationships between BIS and CVIS l CVIS model l Discussion of some algorithms involved in CVIS
  • 4. Simplified Biological IS Model l Extracellular BIS – High level set of interacting components: l Generator/Repressor – B-cells, antibodies l Detector – Detect antigen , detect host/non host l Classifier – Once antigen detected, B-cell determines type l Purger – Eg. Macrophage , antigen purging or cleansing l BIS memory – A store of successful B-cell threat responses l Adaptation process – Continual updating in reaction to imperfect coverage of all pathogens
  • 6. Intracellular BIS l Attempts to find antigens within living human cells. l Generate “Helper” T Cells which can promote antibody prodection from B cells l Antigen Presentation l Major Histocompatability Complex (recognition by T cells)
  • 8. Computer Virus l Significant Computer Threat l High “birth rate” of new viruses l Inability of Anti-Virus software to detect the newest Viruses.
  • 9. Current Methods for Virus Scanning l Current Virus scanning Software looks for bit patterns known to belong to a specific virus. Additionally deductive techniques use “rules of thumb” to identify programs that exhibit “virus like” behaviors. l Although reliable , these methods rely on static knowledge bases, resulting in a the need for continual updating.
  • 10. More robust method needed l Why not apply the principals from immune computing to this obvious application of scanning for Viruses? l Which components of BIS can be used to define a Computer Virus Immune System ? l What are the main implementation challenges?
  • 11. Computer Virus Immune System l Components – Genereate/Suppress Virus l Generate random signatures, Compare signatures to prior sig. – Classify Virus l Isolate virus based on its characteristics, signature extraction – Purge Virus l Purge the virus and repair damaged system resources – Augment Virus Database l If new virus, add to memory l Main Challenge – Replicating BIS inherent parallelism
  • 13. Self/Non-Self Determination l Distinguishing legitimate computer resources from those corrupted by a computer virus l Accomplished via detectors generated at random and compared to protected data l Requires a significant number of detectors l Can become cumbersome if protecting changing files due to creation of new detectors
  • 15. Virus Decoy l Uses decoy programs whose sole purpose is to become infected l Infected decoy can automatically extract viral signature l Does not require the regeneration with changing files l Must be used in conjunction with another method to identify classified viruses
  • 17. Immunity by Design: An Artificial Immune System Steven A. Hofmeyr and Stephanie Forrest
  • 18. ARCHITECTURE l To preserve generality, we represent both the protected system (self) and infectious agents (nonself) as dynamically changing sets of bit strings. l In cells of the body the profile of expressed proteins (self) changes over time, and likewise, we expect our set of protected strings to vary over time. l The body is subjected to different kinds of infections over time; we can view nonself as a dynamically changing set of strings.
  • 19. EXAMPLE: NETWORK SECURITY l We define self to be the set of normal pair wise connections (at the TCP/IP level) between computers. l A connection is defined in terms of its “data-path triple”—the source IP address, the destination IP address, and the service (or port) by which the computers communicate. (49 bit string) l Self signifies recognized familiar addresses while Non-self represents “foreign” addresses
  • 20. NETWORK SECURITY l Each detector cell is represented by a 49 bit string. l Detection = String Matching l New detectors are randomly generated and eliminated if they are matched while still immature (removal of self) l Mature detectors can activate an alarm if a threshold is reached or be removed if they remain unmatched. l This balance between naïve immature and mature cells gives the system adequate adaptability to new antigens.
  • 22. Lifecycle of a detector
  • 23. EXPERIMENTAL RESULTS l Two data sets were collected: l The self set was collected over 50 days. l Self = 1.5 million datapaths mapped to 49-bit binary strings. l At time 0 in the simulation a synthetic attack was detected with probability p = 0.23. l After letting the system respond and adapt for 3 months attack detected with probability 0.76, demonstrating the effectiveness of AIS for learning
  • 25. l Endo et al. (1998) and Toma et al. (1999) proposed an adaptive optimization algorithm based on the immune network model and MHC peptide presentation. In this model, immune network principles were used to produce adaptive behaviors of agents and MHC was used to induce competitive behaviors among agents. The agents possessed a sensor, mimicking MHC peptide presentation by macrophages, the T-cells were used to control the behavior of agents and the B-cells were used to produce behaviors. Combinatorial Optimization (n-TSP Problem)
  • 27.
  • 28. Refrences l de Castro, L, Zuben, F. ARTIFICIAL IMMUNE SYSTEMS: PART II – A SURVEY OF APPLICATIONS Technical Report DCA-RT 02/00 accessed from: http://www.cs.plu.edu/pub/faculty/spillman/seniorprojarts/ids/part2.pdf l Hofmeyr, S., Forrest S. Immunity by Design: An Artificial Immune System l Lamont, G., Marmelstein R., Veldhuizen D. A Distributed Architecture for a Self Adaptive Computer Virus Immune System New Ideas in Optimization l Dasgupta, D. Artificial Immune systems: Theory and Applications Tutorial WCCI 2002, Honolulu Hawaii.