+ All Categories
Home > Documents > Applications of immune system computing

Applications of immune system computing

Date post: 21-Jan-2017
Category:
Upload: ultrauploader
View: 167 times
Download: 0 times
Share this document with a friend
28
Applications of Immune System Computing Ricardo Hoar
Transcript
Page 1: Applications of immune system computing

Applications of Immune SystemComputing

Ricardo Hoar

Page 2: Applications of immune system computing

What kind of applications?

l Computer Security

l Pattern Recognition

l Data Mining and Retrieval

l Multi-Agent Systems

l Design Optimization

l Control Applications

l Robotics

l …

Page 3: Applications of immune system computing

A Distributed Architecture for a SelfAdaptive Computer Virus Immune System

Gary B. Lamont, Robert E. Marmelstein,and David A. Van Veldhuizen

l Simplified Biological IS Model (BIS)

l Relationships between BIS and CVIS

l CVIS model

l Discussion of some algorithms involved inCVIS

Page 4: Applications of immune system computing

Simplified Biological IS Model

l Extracellular BIS– High level set of interacting components:

l Generator/Repressor– B-cells, antibodies

l Detector– Detect antigen , detect host/non host

l Classifier– Once antigen detected, B-cell determines type

l Purger– Eg. Macrophage , antigen purging or cleansing

l BIS memory– A store of successful B-cell threat responses

l Adaptation process– Continual updating in reaction to imperfect coverage of all

pathogens

Page 5: Applications of immune system computing

Extracellular BIS (Diagram)

Page 6: Applications of immune system computing

Intracellular BIS

l Attempts to find antigens within living human cells.

l Generate “Helper” T Cells which can promote antibodyprodection from B cells

l Antigen Presentation

l Major Histocompatability Complex (recognition by Tcells)

Page 7: Applications of immune system computing

Intracellular BIS (Diagram)

Page 8: Applications of immune system computing

Computer Virus

l Significant Computer Threat

l High “birth rate” of new viruses

l Inability of Anti-Virus software to detect thenewest Viruses.

Page 9: Applications of immune system computing

Current Methods for VirusScanning

l Current Virus scanning Software looks for bitpatterns known to belong to a specific virus.Additionally deductive techniques use “rules ofthumb” to identify programs that exhibit “viruslike” behaviors.

l Although reliable , these methods rely on staticknowledge bases, resulting in a the need forcontinual updating.

Page 10: Applications of immune system computing

More robust method needed

l Why not apply the principals from immunecomputing to this obvious application ofscanning for Viruses?

l Which components of BIS can be used todefine a Computer Virus Immune System ?

l What are the main implementation challenges?

Page 11: Applications of immune system computing

Computer Virus Immune System

l Components– Genereate/Suppress Virus

l Generate random signatures, Compare signatures to prior sig.

– Classify Virusl Isolate virus based on its characteristics, signature extraction

– Purge Virusl Purge the virus and repair damaged system resources

– Augment Virus Databasel If new virus, add to memory

l Main Challenge– Replicating BIS inherent parallelism

Page 12: Applications of immune system computing

Generic CVIS Algorithm

Page 13: Applications of immune system computing

Self/Non-Self Determination

l Distinguishing legitimate computer resourcesfrom those corrupted by a computer virus

l Accomplished via detectors generated atrandom and compared to protected data

l Requires a significant number of detectors

l Can become cumbersome if protectingchanging files due to creation of new detectors

Page 14: Applications of immune system computing

Self/Non-Self Determination Algorithm

Page 15: Applications of immune system computing

Virus Decoy

l Uses decoy programs whose sole purpose isto become infected

l Infected decoy can automatically extract viralsignature

l Does not require the regeneration withchanging files

l Must be used in conjunction with anothermethod to identify classified viruses

Page 16: Applications of immune system computing

Virus Decoy Algorithm

Page 17: Applications of immune system computing

Immunity by Design: An ArtificialImmune System

Steven A. Hofmeyrand StephanieForrest

Page 18: Applications of immune system computing

ARCHITECTURE

l To preserve generality, we represent both the protectedsystem (self) and infectious agents (nonself) as dynamicallychanging sets of bit strings.

l In cells of the body the profile of expressed proteins (self)changes over time, and likewise, we expect our set ofprotected strings to vary over time.

l The body is subjected to different kinds of infections overtime; we can view nonself as a dynamically changing set ofstrings.

Page 19: Applications of immune system computing

EXAMPLE: NETWORKSECURITY

l We define self to be the set of normal pair wiseconnections (at the TCP/IP level) betweencomputers.

l A connection is defined in terms of its “data-pathtriple”—the source IP address, the destination IPaddress, and the service (or port) by which thecomputers communicate. (49 bit string)

l Self signifies recognized familiar addresses whileNon-self represents “foreign” addresses

Page 20: Applications of immune system computing

NETWORKSECURITY

l Each detector cell is represented by a 49 bit string.l Detection = String Matchingl New detectors are randomly generated and eliminated

if they are matched while still immature (removal ofself)

l Mature detectors can activate an alarm if a threshold isreached or be removed if they remain unmatched.

l This balance between naïve immature and maturecells gives the system adequate adaptability to newantigens.

Page 21: Applications of immune system computing

The Architecture of the AIS.

Page 22: Applications of immune system computing

Lifecycle of a detector

Page 23: Applications of immune system computing

EXPERIMENTAL RESULTS

l Two data sets were collected:

l The self set was collected over 50 days.

l Self = 1.5 million datapaths mapped to 49-bit binary strings.

l At time 0 in the simulation a synthetic attack was detectedwith probability p = 0.23.

l After letting the system respond and adapt for 3 monthsattack detected with probability 0.76, demonstrating theeffectiveness of AIS for learning

Page 24: Applications of immune system computing

Combinatorial Optimization (n-TSPProblem)

Page 25: Applications of immune system computing

l Endo et al. (1998) and Toma et al. (1999) proposed anadaptive optimization algorithm based on the immunenetwork model and MHC peptide presentation. In this model,immune network principles were used to produce adaptivebehaviors of agents and MHC was used to inducecompetitive behaviors among agents. The agents possessed asensor, mimicking MHC peptide presentation bymacrophages, the T-cells were used to control the behaviorof agents and the B-cells were used to produce behaviors.

Combinatorial Optimization (n-TSP Problem)

Page 26: Applications of immune system computing

Problem Comparison

Page 27: Applications of immune system computing
Page 28: Applications of immune system computing

Refrences

l de Castro, L, Zuben, F. ARTIFICIAL IMMUNE SYSTEMS: PART II – ASURVEY OF APPLICATIONS Technical Report DCA-RT 02/00 accessedfrom:http://www.cs.plu.edu/pub/faculty/spillman/seniorprojarts/ids/part2.pdf

l Hofmeyr, S., Forrest S. Immunity by Design: An Artificial Immune System

l Lamont, G., Marmelstein R., Veldhuizen D. A Distributed Architecture fora Self Adaptive Computer Virus Immune SystemNew Ideas in Optimization

l Dasgupta, D. Artificial Immune systems: Theory and Applications TutorialWCCI 2002, Honolulu Hawaii.


Recommended