Modern Immunological Models and Their Applications

Authors: Skobtsov Yu.A. Published: 26.09.2022
Published in issue: #3(140)/2022  
DOI: 10.18698/0236-3933-2022-3-61-77

Category: Informatics, Computer Engineering and Control | Chapter: Theoretical Computer Science, Cybernetics  
Keywords: artificial immune systems, clonal selection, negative selection, idiopathic network, computer security


The paper considers main models and algorithms of artificial immune systems, which are related to the evolutionary computation paradigm and used to search for potential solutions, each of which is represented by an artificial lymphocyte. Same as an individual in evolutionary computation, an artificial lymphocyte is most often encoded by a binary string or a vector of real numbers. As far as the main models of artificial immune systems are concerned, the clonal selection algorithm is close to the evolutionary strategy of evolutionary computing, though it uses more powerful mutation operators and is applied mainly to solve numerical and combinatorial optimisation problems. The negative selection algorithm is based on the "friend or foe" recognition principle found in the immune system and is most popular in applications. The paper presents two aspects of the algorithm: 1) the basic concept, that is, expanding the set of "friend" cells; 2) the goal, which is to learn to distinguish between "friend" and "foe" cells, while only "friend" cell samples are available. We consider continuous and discrete network models representing regulated networks of molecules and cells. We note the advantages and disadvantages of these models and their application in the field of computer security, robotics, fraud and malfunction detection, data mining, text analysis, image recognition, bioinformatics, games, planning, etc.

Please cite this article in English as:

Skobtsov Yu.A. Modern immunological models and their applications. Herald of the Bauman Moscow State Technical University, Series Instrument Engineering, 2022, no. 3 (140), pp. 61--77 (in Russ.). DOI: https://doi.org/10.18698/0236-3933-2022-3-61-77


[1] Dasgupta D. Artificial immune systems and their applications. London, Springer, Verlag, 1999.

[2] Dasgupta D., Luis F.N. Immunological computation. Theory and applications. Boca Raton, CRC Press, 2008.

[3] Skobtsov Yu.A., Speranskiy D.V. Evolyutsionnye vychisleniya [Evolutionary computation]. Moscow, INTUIT, Lan Publ., 2016.

[4] Castro L.N., von Zuben F.J. Learning and optimization using clonal selection principle. IEEE Trans. Evol. Comput., 2002, vol. 6, no. 3, pp. 239--251. DOI: https://doi.org/10.1109/TEVC.2002.1011539

[5] Yu X., Gen M. Introduction to evolutionary algorithms. London, Springer, Verlag, 2010.

[6] Forrest S., Perelson A.S., Allen L. Self-nonself discrimination in a computer. Proc. 1992 Symp. on Security and Privacy, 1994, pp. 202--212. DOI: https://doi.org/10.1109/RISP.1994.296580

[7] D’haeseleer P., Forrest S., Helman P. An immunological approach to change detection: algorithms, analysis, and implications. Proc. IEEE Symp. on Computer Security and Privacy, 1996, pp. 110--119. DOI: https://doi.org/10.1109/SECPRI.1996.502674

[8] Yang H., Li T., Hu X., et al. A survey of artificial immune system based intrusion detection. Sc. World J., 2014, vol. 2014, art. 156790. DOI: https://doi.org/10.1155/2014/156790

[9] Dasgupta D., Gonzalez F. An immunity-based technique to characterize intrusion in computer networks. IEEE Trans. Evol. Comput., 2002, vol. 6, no. 3, pp. 281--291. DOI: https://doi.org/10.1109/TEVC.2002.1011541

[10] Farmer J.D., Packard N.H., Perelson A.S. The immune system, adaptation, and machine learning. Physica D, 1986, vol. 22, no. 1-3, pp. 187--204. DOI: https://doi.org/10.1016/0167-2789(86)90240-X

[11] Jerne N. Towards a network theory of the immune system. Ann. Immunol., 1974, vol. 125C, no. 1-2, pp. 373--389.

[12] Hunt J.E., Cooke D.E. Learning using an artificial immune system. J. Netw. Comput. Appl., 1996, vol. 19, no. 2, pp. 189--212. DOI: https://doi.org/10.1006/jnca.1996.0014

[13] Skobtsov Yu.A. Artificial immune systems --- basic models. Mathematical Methods in Technologies and Technics, 2021, no. 2, pp. 103--106 (in Russ.). DOI: https://doi.org/10.52348/2712-8873_MMTT_2021_2_103

[14] Skobtsov Yu.A. Vvedenie v iskusstvennye immunnye sistemy [Introduction to artificial immune systems]. St. Petersburg, GUAP Publ., 2022.

[15] Hofmeyr S.A., Forrest S. Architecture for an artificial immune system. Envol. Comput., 2000, vol. 8, no. 4, pp. 443--473. DOI: https://doi.org/10.1162/106365600568257

[16] Balthrop J., Forrest S., Glickman M.R. Revisting LISYS: parameters and normal behavior. IEEE World CEC02, 2002. DOI: https://doi.org/10.1109/CEC.2002.1004387

[17] Balthrop J., Esponda F., Forrest S., et al. Coverage and generalization in artificial immune system. Proc. GECCO, 2002. Available at: http://gpbib.cs.ucl.ac.uk/gecco2002/AAAA243.pdf (accessed: 16.05.2022).

[18] Forrest S., Hofmeyr S., Somayaji A. Computer immunology. Commun. ACM, 1997, vol. 40, no. 10, pp. 88--96. DOI: https://doi.org/10.1145/262793.262811

[19] Forrest S., Hofmeyr S., Somayaji A., et al. A sense of self for Unix processes. Proc. IEEE Symp. on Computer Security and Privacy, 1996. DOI: https://doi.org/10.1109/SECPRI.1996.502675

[20] Kephart J.O. A biologically inspired immune system for computers. In: Artificial life IV. Cambridge, MIT Press, 1994, pp. 130--139. DOI: https://doi.org/10.7551/mitpress/1428.003.0017

[21] Kim J., Wilson W.O., Aickelin U., et al. Cooperative automated worm response and detection immune algorithm (CARDINAL) inspired by T-cell immunity and tolerance. In: Artificial immune systems. Springer, Verlag, 2005, pp. 168--181. DOI: https://doi.org/10.1007/11536444_13

[22] Bradley D.W., Tyrrell A.M. Immunotronics --- novel finite-state-machine architectures with built-in self-test using self-nonself differentiation. IEEE Trans. Evol. Comput., 2002, vol. 6, no. 3, pp. 227--238. DOI: https://doi.org/10.1109/TEVC.2002.1011538