Professional Documents
Culture Documents
Emerging Technology
Congress on Evolutionary Computation 2001.
Seoul, Korea.
Dr. Jonathan Timmis
Computing Laboratory
University of Kent at Canterbury
England. UK.
J.Timmis@ukc.ac.uk
http:/www.cs.ukc.ac.uk/people/staff/jt6
Tutorial Overview
What are Artificial Immune Systems?
Background immunology
Why use the immune system as a metaphor
Artificial Immune
Immune metaphors
Other areas
Idea!
Idea
Artificial Immune
CEC 2001
Artificial Immune
Robustness
Feature extraction
Diversity
Reinforcement learning
Memory
Distributed
Multi-layered
Adaptive
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Where is it?
CEC 2001
Artificial Immune
Skin
Biochemical
barriers
Phagocyte
Innate
immune
response
Lymphocytes
Adaptive
immune
response
CEC 2001
Artificial Immune
Antibodies
Antigen binding sites
VH
VH
VL
VL
CH
Fab
CH
Fab
CL
CL
CH
CH
Fc
Antibody Molecule
CEC 2001
Antibody Production
Artificial Immune
Clonal Selection
CEC 2001
Artificial Immune
T-cells
Regulation of other cells
Active in the immune response
Helper T-cells
Killer T-cells
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Associative memory
CEC 2001
Artificial Immune
Learning (2)
Antibody Concentration
Cross-Reactive
Response
Secondary Response
Primary Response
Lag
Lag
Response
to Ag1
Lag
Response
to Ag1
...
...
...
Response to
Ag1 + Ag3
Response
to Ag2
Antigen Ag1
Antigens
Ag1, Ag2
CEC 2001
Artificial Immune
...
Antigen
Ag1 + Ag3
Time
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Self/Non-Self Recognition
Immune system needs to be able to
differentiate between self and non-self cells
Antigenic encounters may result in cell
death, therefore
Some kind of positive selection
Some element of negative selection
CEC 2001
Artificial Immune
Summary so far .
Immune system has some remarkable
properties
Pattern recognition
Learning
Memory
So, is it useful?
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Topics to Cover
A few disclaimers
I can not cover everything as there is a large amount
of work out there
To do so, would be silly
Proposed general frameworks
Give an overview of significant application areas
and work therein
I am not an expert in all the problem domains
I would earn more money if I was !
CEC 2001
Artificial Immune
Shape Space
Describe interactions between molecules
Degree of binding between molecules
Complement threshold
Each paratope matches a certain region of
space
Complete repertoire
CEC 2001
Artificial Immune
Affinity threshold
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Somatic Hypermutation
Mutation rate in proportion to affinity
Very controlled mutation in the natural immune system
Trade-off between the normalized antibody affinity D*
and its mutation rate ,
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Anomaly Detection
The normal behavior of a system is often
characterized by a series of observations over time.
The problem of detecting novelties, or anomalies,
can be viewed as finding deviations of a
characteristic property in the system.
For computer scientists, the identification of
computational viruses and network intrusions is
considered one of the most important anomaly
detection tasks
CEC 2001
Artificial Immune
Virus Detection
Protect the computer from unwanted viruses
Initial work by Kephart 1994
More of a computer immune system
Detect Anomaly
Segregate
code/data
Algorithmic
Virus Analysis
Extract Signature(s)
CEC 2001
Artificial Immune
Send signals to
neighbor machines
Artificial Immune
Computational System
Pathogens (antigens)
Computer viruses
Detectors
Proteins
Strings
Antibody/antigen binding
Pattern matching
CEC 2001
Artificial Immune
Security
Somayaji et al. (1997) outlined mappings
between IS and computer systems
A security systems need
Confidentiality
Integrity
Availability
Accountability
Correctness
CEC 2001
Artificial Immune
IS to Security Systems
Immune System
Network Environment
Static Data
Self
Uncorrupted data
Non-self
Cell
Multicellular organism
Population of organisms
Autoimmune response
Self
Normal behavior
Non-self
Abnormal behavior
Adaptive immunity
CEC 2001
Artificial Immune
Network Security
Hofmeyr
&
Forrest
(1999, 2000):
developing an artificial immune system that
is distributed, robust, dynamic, diverse and
adaptive, with applications to computer
network security.
Kim & Bentley (1999). New paper here at
CEC so I wont cover it, go see it for
yourself!
CEC 2001
Artificial Immune
Forrests Model
External
host
ip: 20.20.15.7
port: 22
Datapath triple
Internal
host
Randomly
created
Host
Activation Detector
threshold
set
Cytokine
level
010011100010.....001101
Immature
No match during
tolerization
(20.20.15.7, 31.14.22.87,
ftp)
Permutation
mask
ip: 31.14.22.87
port: 2000
Detector
Match
during
tolerization
0100111010101000110......101010010
Broadcast LAN
immaturememory
activated matches
Dont
exceed
activation
threshold
Death
Exceed
activation
threshold
Activated
No
co stimulation
Match
Co stimulation
Memory
AIS for computer network security. (a) Architecture. (b) Life cycle of a detec
CEC 2001
Artificial Immune
Novelty Detection
Image Segmentation : McCoy &
Devarajan (1997)
Detecting road contours in aerial
images
Used a negative selection algorithm
CEC 2001
Artificial Immune
Recognition of self
Recognition of non-self
Learning
Humoral immunity
Clonal deletion
Inactivation of antigen
Life of an organism
CEC 2001
Artificial Immune
Machine Learning
Early work on DNA Recognition
Cooke and Hunt, 1995
Use immune network theory
Evolve a structure to use for prediction of DNA
sequences
90% classification rate
Quite good at the time, but needed more
corroboration of results
CEC 2001
Artificial Immune
Unsupervised Learning
Timmis, 2000
Based on Hunts work
Complete redesign of algorithm: AINE
Immune metadynamics
Shape space
Few initial parameters
Stabilises to find a core pattern within a
network of B cells
CEC 2001
Artificial Immune
CEC 2001
Artificial Immune
Another approach
de Castro and von Zuben, 2000
aiNET cf. SOFM
Use similar ideas to Timmis
Immune network theory
Shape space
Artificial Immune
Test Problem
CEC 2001
Artificial Immune
Supervised Approach
Carter, 2000
Pattern recognition and classification system:
Immunos-81
Use T-cells, B-cells, antibodies and amino-acid
library
Builds a library of data types and classes
System can generalise
Good classification rates on sample data sets
CEC 2001
Artificial Immune
Robotics
Behaviour Arbitration
Ishiguro et al. (1996, 1997) : Immune network theory to
evolve a behaviour among a set of agents
Collective Behaviour
Emerging collective behaviour through communicating
robots (Jun et al, 1999)
Immune network theory to suppress or encourage robots
behaviour
Paratope
Desirable
condition
CEC 2001
Artificial Immune
Action
Idiotope
Interacting antibodies
and degree of interaction
Scheduling
Hart et al. (1998) and Hart & Ross (1999a)
Proposed an AIS to produce robust schedules
for a dynamic job-shop scheduling problem in which jobs arrive
continually, and the environment is subject to changes.
CEC 2001
Artificial Immune
Diagnosis
Ishida (1993)
Immune network model applied to the process diagnosis problem
Later was elaborated as a sensor network that could diagnose
sensor faults by evaluating reliability of data from sensors, and
process faults by evaluating reliability of constraints among data.
Main immune features employed:
Recognition is performed by distributed agents which dynamically interact
with each other;
Each agent reacts based solely on its own knowledge; and
Memory is realized as stable equilibrium points of the dynamical network.
CEC 2001
Artificial Immune
Summary
Covered much, but there is much work not covered
(so apologies to anyone for missing theirs)
Immunology
Immune metaphors
Antibodies and their interactions
Immune learning and memory
Self/non-self
Negative selection
CEC 2001
Artificial Immune
The Future
Rapidly growing field that I think is very
exciting
Much work is very diverse
Need of a general framework
Artificial Immune