An Introduction to Artificial Immune Systems Dr. Jonathan Timmis Computing Laboratory University of Kent at Canterbury CT2 7NF. UK.

Slides:



Advertisements
Similar presentations
V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.
Advertisements

Artificial Immune Systems. CBA - Artificial Immune Systems Artificial Immune Systems: A Definition AIS are adaptive systems inspired by theoretical immunology.
Sazalinsyah Razali (syah)‏ Dr. Q. Meng (Supervisor)‏
CIFD: Computational Immunology for Fraud Detection
Immune System Part III:
Artificial Immune Systems Razieh Khamseh-Ashari Department of Electrical and Computer Eng Isfahan University of Technology Supervisor: Dr. Abdolreza Mirzaei.
1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.
Lecture 4 Activation of Adaptive Immunity. Overview In order to initiate an immune response antigen must be recognized. In order to initiate an immune.
Immune System Chapter 14.
Biologically Inspired AI (mostly GAs). Some Examples of Biologically Inspired Computation Neural networks Evolutionary computation (e.g., genetic algorithms)
EvoNet Flying Circus Introduction to Evolutionary Computation Brought to you by (insert your name) The EvoNet Training Committee The EvoNet Flying Circus.
Anomaly Detection in Data Docent Xiao-Zhi Gao
Lecture outline The nomenclature of Immunology
Artificial Immune Systems Andrew Watkins. Why the Immune System? Recognition –Anomaly detection –Noise tolerance Robustness Feature extraction Diversity.
Information Processing in Living Systems. Does the brain compute?
Artificial Immune Systems: An Emerging Technology Dr. Jonathan Timmis Computing Laboratory University of Kent at Canterbury England. UK.
EC: Lecture 17: Classifier Systems Ata Kaban University of Birmingham.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
EvoNet Flying Circus Introduction to Evolutionary Computation Brought to you by (insert your name) The EvoNet Training Committee The EvoNet Flying Circus.
Complexity and the Immune System. Why look at the immune system? -Intermediate level -One of the major information processing systems in the body (with.
Principles of Immunology Overview of Adaptive Immunity 1/24/06 “Too many people overvalue what they are not and undervalue what they are.” M Forbes.
Artificial Immune Systems: A New Computational Intelligence Approach
The body’s defenses. Reading: Ch. 43; Keywords Lines of defense Lymphatic system Inflammation Features of immune system Memory B-cells Primary and secondary.
1 Negative selection algorithms: from the thymus to V-detector Dissertation defense Zhou Ji Major professor: Prof. Dasgupta Advisory committee: Dr. Lin,
Introduction to Artificial Immune Systems (AIS) BIC 2005: International Symposium on Bio-Inspired Computing Johor, MY, 5-7 September 2005 Dr. Leandro Nunes.
Internal Presentation by : Lei Wang Pervasive and Artificial Intelligenge research group On: An Artificial Immune System for .
Specific immune system
Population-based metaheuristics Nature-inspired Initialize a population A new population of solutions is generated Integrate the new population into the.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Genetic Algorithms Overview Genetic Algorithms: a gentle introduction –What are GAs –How do they work/ Why? –Critical issues Use in Data Mining –GAs.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
Genetic Programming.
1 Principles of a Computer Immune System Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest Presented by: Jesus Morales.
Genetic Algorithm.
Genetic Algorithms and Ant Colony Optimisation
Specific Cellular Defence.  Range of white blood cells (WBCs) circulate monitoring for damage, pathogens or cancerous cells  In response to damage or.
Specific Defense Mechanisms – The Immune System
Immune System Metaphors Applied to Intrusion Detection and Related Problems by Ian Nunn, SCS, Carleton University
SOFT COMPUTING (Optimization Techniques using GA) Dr. N.Uma Maheswari Professor/CSE PSNA CET.
Nasraoui, Gonzalez, Cardona, Dasgupta: Scalable Artificial Immune System Based Data Mining NSF-NGDM, Nov. 1-3, 2002, Baltimore, MD Artificial Immune Systems.
Rogério de LemosDEFINE – Pisa, November 2002 – 1 Proactive Computing: Artificial Immune Systems Rogério de Lemos University of Kent at Canterbury  Brian.
Automatic Test-Data Generation: An Immunological Approach Kostas Liaskos Marc Roper {Konstantinos.Liaskos, TAIC PART 2007.
Zentrum für Hochleistungsrechnen (ZHR) – A Bios Group Presentation Niloy Ganguly Immune System and Search Technology Designing a Fast Search Algorithm.
CS 484 – Artificial Intelligence1 Announcements Lab 3 due Tuesday, November 6 Homework 6 due Tuesday, November 6 Lab 4 due Thursday, November 8 Current.
Boltzmann Machine (BM) (§6.4) Hopfield model + hidden nodes + simulated annealing BM Architecture –a set of visible nodes: nodes can be accessed from outside.
Cell mediated response What the B-cells miss or are not programmed to deal with T-cells are able to handle. Usually 1.
Introduction to Evolutionary Algorithms Session 4 Jim Smith University of the West of England, UK May/June 2012.
APPLICATION OF THE METHOD AND COMBINED ALGORITHM ON THE BASIS OF IMMUNE NETWORK AND NEGATIVE SELECTION FOR IDENTIFICATION OF TURBINE ENGINE SURGING Lytvynenko.
1/27 Discrete and Genetic Algorithms in Bioinformatics 許聞廉 中央研究院資訊所.
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
CHAPTER 23 Molecular Immunology.
Telling self from non-self: Learning the language of the Immune System Rose Hoberman and Roni Rosenfeld BioLM Workshop May 2003.
Chapter 23 Immunogenetics. The immune response in mammals involves three steps: 1.Recognition of the foreign substance 2.Communication of this recognition.
Adaptive immunity – B cell
Artificial Immune System based Cooperative Strategies for Robot Soccer Competition International Forum on Strategic Technology, p.p , Oct
IMMUNOLOGICAL TOLERANCE Lecture 6 Jan Żeromski 2007/2008.
1. Genetic Algorithms: An Overview  Objectives - Studying basic principle of GA - Understanding applications in prisoner’s dilemma & sorting network.
Changing the Rules of the Game Dr. Marco A. Janssen Department of Spatial Economics.
CITS7212: Computational Intelligence An Overview of Core CI Technologies Lyndon While.
___________DEFENSES of the HOST: THE IMMUNE RESPONSE
Dr.Abeer Mahmoud ARTIFICIAL INTELLIGENCE (CS 461D) Dr. Abeer Mahmoud Computer science Department Princess Nora University Faculty of Computer & Information.
Immunology B cells and Antibodies – humoral
Lecture 7 Immunology Cells of adaptive immunity
Presentation By SANJOG BHATTA Student ID : July 1’ 2009.
1 Azhari, Dr Computer Science UGM. Human brain is a densely interconnected network of approximately neurons, each connected to, on average, 10 4.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
Artificial Intelligence (CS 370D)
Immune System Chapter 14.
Telling self from non-self: Learning the language of the Immune System
Immunocomputing and Artificial Immune Systems
Presentation transcript:

An Introduction to Artificial Immune Systems Dr. Jonathan Timmis Computing Laboratory University of Kent at Canterbury CT2 7NF. UK. ES2001 Cambridge. December 2001.

Overview of Tutorial What are we going to do?: First Half: Describe what is an AIS Why bother with the immune system? Be familiar with relevant immunology Second Half: Appreciation of were AIS are used Be familiar with the building blocks of AIS Resources

Immune metaphors Immune System Idea!Idea ‘ Other areas Artificial Immune Systems

Why the Immune System? Recognition Anomaly detection Noise tolerance Robustness Feature extraction Diversity Reinforcement learning Memory Distributed Multi-layered Adaptive

Artificial Immune Systems AIS are computational systems inspired by theoretical immunology and observed immune functions, principles and models, which are applied to complex problem domains (de Castro & Timmis, 2001)

Some History Developed from the field of theoretical immunology in the mid 1980’s. Suggested we ‘might look’ at the IS 1990 – Bersini first use of immune algos to solve problems Forrest et al – Computer Security mid 1990’s Hunt et al, mid 1990’s – Machine learning

Scope of AIS Fault and anomaly detection Data Mining (machine learning, Pattern recognition) Agent based systems Scheduling Autonomous control Optimisation Robotics Security of information systems

Part I – Basic Immunology

Role of the Immune System Protect our bodies from infection Primary immune response Launch a response to invading pathogens Secondary immune response Remember past encounters Faster response the second time around

How does it work?

Where is it?

Multiple layers of the immune system

Immune Pattern Recognition The immune recognition is based on the complementarity between the binding region of the receptor and a portion of the antigen called epitope. Antibodies present a single type of receptor, antigens might present several epitopes. This means that different antibodies can recognize a single antigen

Antibodies Antibody MoleculeAntibody Production

Clonal Selection

Main Properties of Clonal Selection (Burnet, 1978) Elimination of self antigens Proliferation and differentiation on contact of mature lymphocytes with antigen Restriction of one pattern to one differentiated cell and retention of that pattern by clonal descendants; Generation of new random genetic changes, subsequently expressed as diverse antibody patterns by a form of accelerated somatic mutation

T-cells Regulation of other cells Active in the immune response Helper T-cells Killer T-cells

Reinforcement Learning and Immune Memory Repeated exposure to an antigen throughout a lifetime Primary, secondary immune responses Remembers encounters No need to start from scratch Memory cells Associative memory

Learning (2)

Immune Network Theory Idiotypic network ( Jerne, 1974) B cells co-stimulate each other Treat each other a bit like antigens Creates an immunological memory

Immune Network Theory(2)

Shape Space Formalism Repertoire of the immune system is complete ( Perelson, 1989) Extensive regions of complementarity Some threshold of recognition  V   V   V  V       

Self/Non-Self Recognition Immune system needs to be able to differentiate between self and non-self cells Antigenic encounters may result in cell death, therefore Some kind of positive selection Some element of negative selection

Summary so far …. Immune system has some remarkable properties Pattern recognition Learning Memory So, is it useful?

Some questions for you !

Part II –Artificial Immune Systems

This Section General Framework for describing and constructing AIS A short review of where AIS are used today Can not cover them all, far too many I am not an expert in all areas (earn more money if I was) Where are AIS headed?

What do want from a Framework? In a computational world we work with representations and processes. Therefore, we need: To be able to describe immune system components Be able to describe their interactions Quite high level abstractions Capture general purpose processes that can be applied to various areas

AIS Framework De Castro & Timmis, 2002 Immune Representations Immune Algorithms Guidelines for developing AIS

Representation – Shape Space Describe the general shape of a molecule Describe interactions between molecules Degree of binding between molecules Complement threshold

Representation Vectors Ab =  Ab 1, Ab 2,..., Ab L  Ag =  Ag 1, Ag 2,..., Ag L  Real-valued shape-space Integer shape-space Hamming shape-space Symbolic shape-space

Define their Interaction Define the term Affinity Affinity is related to distance Euclidian Other distance measures such as Hamming, Manhattan etc. etc. Affinity Threshold

Basic Immune Models and Algorithms Bone Marrow Models Negative Selection Algorithms Clonal Selection Algorithm Somatic Hypermutation Immune Network Models

Bone Marrow Models Gene libraries are used to create antibodies from the bone marrow Antibody production through a random concatenation from gene libraries Simple or complex libraries

Negative Selection Algorithms Forrest 1994: Idea taken from the negative selection of T-cells in the thymus Applied initially to computer security Split into two parts: Censoring Monitoring

Negative Selection Algorithm Each copy of the algorithm is unique, so that each protected location is provided with a unique set of detectors Detection is probabilistic, as a consequence of using different sets of detectors to protect each entity A robust system should detect any foreign activity rather than looking for specific known patterns of intrusion. No prior knowledge of anomaly (non-self) is required The size of the detector set does not necessarily increase with the number of strings being protected The detection probability increases exponentially with the number of independent detection algorithms There is an exponential cost to generate detectors with relation to the number of strings being protected (self). Solution to the above in D’haeseleer et al. (1996)

Clonal Selection Algorithm de Castro & von Zuben, 2001 Randomly initialise a population (P) For each pattern in Ag Determine affinity to each P’ Select n highest affinity from P Clone and mutate prop. to affinity with Ag Add new mutants to P endFor Select highest affinity P to form part of M Replace n number of random new ones Until stopping criteria

Immune Network Models Timmis & Neal, 2000 Used immune network theory as a basis, proposed the AINE algorithm Initialize AIN For each antigen Present antigen to each ARB in the AIN Calculate ARB stimulation level Allocate B cells to ARBs, based on stimulation level Remove weakest ARBs (ones that do not hold any B cells) If termination condition met exit else Clone and mutate remaining ARBs Integrate new ARBs into AIN

Immune Network Models De Castro & Von Zuben (2000c) aiNET, based in similar principles At each iteration step do For each antigen do Determine affinity to all network cells Select n highest affinity network cells Clone these n selected cells Increase the affinity of the cells to antigen by reducing the distance between them (greedy search) Calculate improved affinity of these n cells Re-select a number of improved cells and place into matrix M Remove cells from M whose affinity is below a set threshold Calculate cell-cell affinity within the network Remove cells from network whose affinity is below a certain threshold Concatenate original network and M to form new network Determine whole network inter-cell affinities and remove all those below the set threshold Replace r% of worst individuals by novel randomly generated ones Test stopping criterion

Somatic Hypermutation Mutation rate in proportion to affinity Very controlled mutation in the natural immune system Trade-off between the normalized antibody affinity D* and its mutation rate ,

Part III - Applications

Anomaly Detection The normal behavior of a system is often characterized by a series of observations over time. The problem of detecting novelties, or anomalies, can be viewed as finding deviations of a characteristic property in the system. For computer scientists, the identification of computational viruses and network intrusions is considered one of the most important anomaly detection tasks

Virus Detection Protect the computer from unwanted viruses Initial work by Kephart 1994 More of a computer immune system

Virus Detection (2) Okamoto & Ishida (1999a,b) proposed a distributed approach Detected viruses by matching self-information first few bytes of the head of a file the file size and path, etc. against the current host files. Viruses were neutralized by overwriting the self- information on the infected files Recovering was attained by copying the same file from other uninfected hosts through the computer network

Virus Detection (3) Other key works include: A distributed self adaptive architecture for a computer virus immune system (Lamont, 200) Use a set of co-operating agents to detect non-self patterns Immune SystemComputational System Pathogens (antigens)Computer viruses B-, T-cells and antibodiesDetectors ProteinsStrings Antibody/antigen bindingPattern matching

Security Somayaji et al. (1997) outlined mappings between IS and computer systems A security systems need Confidentiality Integrity Availability Accountability Correctness

IS to Security Systems Immune SystemNetwork Environment Static Data SelfUncorrupted data Non-selfAny change to self Active Processes on Single Host CellActive process in a computer Multicellular organismComputer running multiple processes Population of organismsSet of networked computers Skin and innate immunitySecurity mechanisms, like passwords, groups, file permissions, etc. Adaptive immunityLymphocyte process able to query other processes to seek for abnormal behaviors Autoimmune responseFalse alarm SelfNormal behavior Non-selfAbnormal behavior Network of Mutually Trusting Computers Organ in an animalEach computer in a network environment

Network Security Hofmeyr & Forrest (1999, 2000): developing an artificial immune system that is distributed, robust, dynamic, diverse and adaptive, with applications to computer network security. Kim & Bentley (2001). Hybrid approach of clonal selection and negative selection.

Forrests Model AIS for computer network security. (a) Architecture. (b) Life cycle of a detector. Randomlycreated Immature Mature & Naive Death Activated Memory No matchduring tolerization Exceed activation threshold Don’t exceed activation threshold No co stimulation Co stimulation Match during tolerization Datapathtriple ( , , ftp) Broadcast LAN ip: port: 2000 Internal host External host ip: port: 22 Host sensitivity level secondary representation Detector set {immature, naive, memory} Last activated matches Detector state Activation flag

Novelty Detection Image Segmentation : McCoy & Devarajan (1997) Detecting road contours in aerial images Used a negative selection algorithm

Hardware Fault Tolerance Immunotronics (Bradley & Tyrell, 2000) Use negative selection algorithm for fault tolerance in hardware Table 4.1. Immune SystemHardware Fault Tolerance Recognition of selfRecognition of valid state/state transition Recognition of non-selfRecognition of invalid state/state transition LearningLearning correct states and transitions Humoral immunityError detection and recovery Clonal deletionIsolation of self-recognizing tolerance conditions Inactivation of antigenReturn to normal operation Life of an organismOperation lifetime of a hardware

Machine Learning Early work on DNA Recognition Cooke and Hunt, 1995 Use immune network theory Evolve a structure to use for prediction of DNA sequences 90% classification rate Quite good at the time, but needed more corroboration of results

Unsupervised Learning Timmis, 2000 Based on Hunts work Complete redesign of algorithm: AINE Immune metadynamics Shape space Few initial parameters Stabilises to find a core pattern within a network of B cells

Results (Timmis, 2000)

Immune System : AIS B-cell B-cell recognition Immune Network Somatic Hypermutation Antigens Antigen binding Initial Data Artificial Recognition Ball ARB Network Mutation of ARB’s Training data Matching between antigen and ARB’s

Another approach de Castro and von Zuben, 2000 aiNET cf. SOFM Use similar ideas to Timmis Immune network theory Shape space Suppression mechanism different Eliminate self similar cells under a set threshold Clone based on antigen match, network not taken into account

Results (de Castro & von Zuben, 2001) Test ProblemResult from aiNET

Supervised Approach Carter, 2000 Pattern recognition and classification system: Immunos-81 Use T-cells, B-cells, antibodies and amino-acid library Builds a library of data types and classes Watkins, 2001 Resource allocated mechanism (based on network models) Good classification rates on sample data sets

Robotics Behaviour Arbitration Ishiguro et al. (1996, 1997) : Immune network theory to evolve a behaviour among a set of agents Collective Behaviour Emerging collective behaviour through communicating robots (Jun et al, 1999) Immune network theory to suppress or encourage robots behaviour

Scheduling Hart et al. (1998) and Hart & Ross (1999a) Proposed an AIS to produce robust schedules for a dynamic job-shop scheduling problem in which jobs arrive continually, and the environment is subject to changes. Investigated is an AIS could be evolved using a GA approach then be used to produce sets of schedules which together cover a range of contingencies, predictable and unpredictable. Model included evolution through gene libraries, affinity maturation of the immune response and the clonal selection principle.

Diagnosis Ishida (1993) Immune network model applied to the process diagnosis problem Later was elaborated as a sensor network that could diagnose sensor faults by evaluating reliability of data from sensors, and process faults by evaluating reliability of constraints among data. Main immune features employed: Recognition is performed by distributed agents which dynamically interact with each other; Each agent reacts based solely on its own knowledge; and Memory is realized as stable equilibrium points of the dynamical network.

Comparing Approaches AISANNEA ComponentsAttribute string in SArtificial neuronsStrings representing chromosomes Location of componentsDynamic locationsPre-defined/dynamic (deterministic) locations Dynamic locations StructureSet of discrete or networked elements Networked neuronsDiscrete elements Knowledge storageAttribute strings/ network connections Connection strengthsChromosomal strings DynamicsLearning/evolutionLearningEvolution MetadynamicsElimination/recruitment of components Constructive/pruning algorithmsElimination/ recruitment of individuals Interaction with other components Through recognition of attribute strings or network connections Through network connectionsThrough recombination operators and/or fitness function Interaction with the environment Recognition of an input pattern or evaluation of an objective function Input units receive the environmental stimuli Evaluation of an objective function ThresholdInfluences the affinity of elements Influences neuron activationInfluences genetic variations RobustnessPopulation/network of individuals Network of individualsPopulation of individuals StateConcentration and affinityActivation level of output neurons Genetic information in chromosomes ControlImmune principle, theory or process Learning algorithmEvolutionary algorithm Generalization capability Cross-reactionNetwork extrapolationDetection of common schemas Non-linearityBinding activation functionNeuronal activation functionNot explicit CharacterizationEvolutionary and/or connectionist According to the learning algorithm Evolutionary

Summary Covered much, but there is much work not covered (so apologies to anyone for missing theirs) Immunology Immune metaphors Antibodies and their interactions Immune learning and memory Self/non-self Negative selection Application of immune metaphors

The Future Rapidly growing field that I think is very exciting Much work is very diverse Framework helps a little More formal approach required? Wide possible application domains What is it that makes the immune system unique?

More Information