A Comparative study of Dentitic cell and immune networks algorithm for Artificial immune networks.
Jaspreet kaur, Kamal Kumar
Abstract – Artificial immune systems are the systems used for advanced computational systems for the need of robust and secure functioning of computer systems. They are the systems inspired by the human immune systems in the human immunity save the body from external threats. We in this paper would be working on the networking branch of the AIS which is called Artificial immune networks which builds up an immunity in the network against the attacks. The accuracy, time analysis and a few other parameters are to be studied using two algorithms of Artificial immune networks. The two algorithms which we are taking in action will be immune networks algorithm and Dentritic cell algorithm.
1 INTRODUCTION
An immune system, one of the most intricate biological sys-tems, has been used as a metaphor for intelligent computation in a variety of domains. Artificial Immune System (AIS) has been considered as a family of techniques originated from the community of immunology. As an important constituent of the AIS, the artificial immune networks are based on the principles of the behaviors of both B cells and T cells in the biological immune system. B cell is an integral part of the immune system. Through a process of recognition and stimulation, the B cells can clone and mutate to produce a diverse set of antibodies in an attempt to remove the infection from the body. T cell has two types. One regulates and con-trols the strength of the immune response, and the other di-rectly destroys the cells that have specific antigens. Both the B cells and T cells have been widely employed to solve a wide range of engineering problems, such as anomaly detection and data mining. This paper aims at giving a concise overview on the artificial immune network models including their theory, structures, and applications.
Functions, principles and models, which can be applied to real world problems. According to the mechanis of DCs, the Dendritic cell Algorithm (DCA) has been put forward by Greensmith and successfully applied to a range of problems, particularly in the area of anomaly detection
Compared with the classical AIS algorithms , the DCA has advantages of small calculations, strong recognition ability and few training samples, but it also hasthe defect that it will have promising detection accuracy onlyin ordered data sets, with the increasing of the disorder degree in data sets, the accuracy will reduce and the false positives and the false negatives will increase obviously. Experiments show that except some noise data most of the
mistakes occur during the transition phases, this is because during a transition phase there is a small degree of confusion regarding temporally and spatially clustered antigens and DC may sample multiple antigens in different types of context.
The Dendritic Cell Algorithm (DCA) is a second generation Artificial Immune System (AIS) algorithm. It is based on an abstract model of the function of dendritic cells and their ability to discriminate between healthy and infected tissue . As a context-aware anomaly detection algorithm, the DCA performs well in malware detection. Current research with this algorithm have suggested that the DCA shows not only excellent performance on detection rate, but also promise in assisting in reducing the number of false positive errors shown with similar systems.
Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service
However, as the defenses evolve, so does the malware. The DCA distinguishes between normal and potentially malicious antigens on the basis of the concentration of danger signals they cause and neighboring antigens. This feature cabe exploited by crafty malware via mimicry attacks (such as blending with normal activities or mimicking normal behavior) to evade detection by the DCA . For example, some stealthy malware communicate with remote servers only when they detect user activities (such as requesting web pages). This reduces both the frequency and significance of malicious behavior, making the malware less active and more likely to avoid detection by the DCA. In , Gu et al. proposed an improvement for the DCA namely antigen multiplier to overcome the problem of ‘antigen deficiency’. As an additional function of the DCA, antigen multiplier can make several copies of each individual antigen which can be fed to multiple dendritic cells (DCs). Then the classification decision is averaged over the replicated population. The experimental results showed that antigen multiplier helped in improving the classification accuracy. But, as antigen multiplier copies every antigen it meets indifferently, it may show less resistance to mimicry attacks since the concentration of potentially malicious antigens is not increased. Similar to the inefficient detection to hidden and inactive malware by the DCA, biological immune system (BIS) also shows inefficiency when responds to some antigens.
2 LITERATURE REVIEW
In this research paper [1] the author has analysed the immune theory and hopfied neural network (HNN), them proposing a new algorithm for multidimensional functionality. A group of solutions are collected for analyses using k means algorithm. Then later on the cluster is taken which is cluster centurions by k means algorithm. In this paper, by making use of the advantages of clustering analysis algorithm, HNN and ia, a new algorithm is proposed to solve the optimal problems of multimodal function with high dimensions. Simulation experiment proves that the new algorithm has much higher accuracy and shorter running time, compared with ia. Especially, at high dimensional function, the new algorithm has clearly advantage.
In this paper[2], a novel multi-modal optimization algorithm, namely Dcopt-aiNet is proposed, which is based on biological immune network mechanism for global numerical optimization. Different from de Castro’s opt-aiNet algorithm, Dcopt-aiNet models cloning operation using dynamic cloning operation which is adopted from biological immune network mechanism. Based on the multi-modal benchmarks, experiments were carried out to compare the performance of Dcopt-aiNet with that of opt-aiNet. Experiment results show that when compared with the opt-aiNet method, the new algorithm is capable of improving search performance significantly in successful rate and convergence speed.
In this paper [3] the author has proposed the the use of DCA for malwre detection. Artificial adjuvants increase ‘immunogenicity’ of stealthy malware which speeds up the immunigenicity of them. This is how they improve the malware detection with help of DCA. Future work proposed in this paper is that the experiments need to evaluate their effects on enhancing the detection performance of dca. Further we need to better understand the mechanisms of immunological adjuvants can be beneficial to design more biologically. Lastly to make more diverse and more general algorithms.
In this research paper[4] the algorithm is posed to only good in ordered data set but the results in the other cases are not considered to be great. In instances of different antigens, each instance is accesed and finally all the asessments made are taken into account. Proposed algorithm i.e. Mmdca brings up the nature of each multiplier and also it can be inferred that the false positives is higher, this is because the dca weights matrix used to calculate the semi and mat tends to mat.
With the intrinsic properties of multimodal optimization problems, a multi-population artificial immune network algorithm (mopt-aiNet) is proposed to improve the performance of static and time-varing multimodal optimization problems by making use of biologic immune mechanism in this paper[5]. Compared with other immune network search methods, several novel operations such as multi-population dynamic hypermutation, asynchronous colony evolution, dynamic memory solutions management and a hill-valley exploring are designed which can speed up searching the environment in an optimal way. Two other immune network algorithms are compared against mopt-aiNet by using static and dynamic benchmarks. Comparative analysis illustrates mopt-aiNet’s potential value.
A bi-objective optimization model of power and power changes generated by a wind turbine is discussed in this paper[6]. The model involves two objectives, power maximization and power ramp rate (PRR) minimization. A new constraint for power maximization based on physics and process control theory is introduced. Data-mining algorithms were used to identify the model of power generation from the industrial data collected at a wind farm. The models and constraints derived from the data were integrated to optimize the power itself and the power variability, expressed as the power ramp rate. Due to the nonlinearity and complexity of the optimization model, an artificial immune network algorithm was used to solve it. The optimization results, such as computed operation strategies and the corresponding outputs, are demonstrated and discussed.
In this paper [7] , the problem of finding the optimal collision free path, path planning for the case of a controllable mobile robot moving in a static environment filled with obstacles with known shape and size is studied. A path planner based on a hybrid memetic algorithm, Genetic Artificial Immune Network (GAIN), which provides near optimal collision free path is proposed. Genetic Artificial Immune Network is a hybrid memetic algorithm based on Genetic Algorithm (GA) and Artificial Immune Network (AIN) algorithm. The network cell structures are simple which makes the operators simple and results in a fast calculation with smaller number of cells. The results obtained from GAIN is compared with that of GA and GAIN is found to outperform. GA in terms of convergence speed and result obtained, making it a promising algorithm for solving the mobile robot path planning problem.
3 PROBLEM FORMULATION
Adaptive immunity is directed towards specific invaders; either seen before or not previously encountered and gets modified by exposure to invaders. It mainly consists of lymphocytes (white blood cells, more specifically B and T type) that aid the process of recognizing and destroying specific substances, and are antigen-specific.
Clonal Selection: Clonal selection theory was proposed by Burnet. The theory is used to explain basic response of adaptive immune system to antigenic stimulus. It establishes the idea that only those cells capable of recognizing an antigen will proliferate while other cells are selected against. Clonal selection operates on both B and T cells. B cells, when their antibodies bind with an antigen, are activated and differentiated into plasma or memory cells. Prior to this process, clones of B cells are produced and undergo somatic hyper mutation. As a result, diversity is introduced into the B cell population. Plasma cells produce antigen-specific antibodies that are work against antigen. Memory cells remain with the host and promote a rapid secondary response.
Negative Selection :Negative selection is a mechanism to protect body against self-reactive lymphocytes. It utilizes the immune system’s ability to detect unknown antigens while not reacting to the self cells. During the generation of T-cells, receptors are made through a pseudo-random genetic rearrangement process. Then, they undergo a censoring process in the thymus, called the negative selection. In this process, T-cells that react against self-proteins are destroyed and only those that do not bind to self-proteins are allowed to leave the thymus. These matured T-cells then circulate throughout the body performing immunological functions and protecting the body against foreign antigens.
4 OBJECTIVES
1. To study intuitively and understand the working of dentritic cell and immune networks technique in artificial immune systems.
2. To analyse the two above mentioned techniques on the basis of the following parameters:-
A. Accuracy
B. Response time
C. Fittest cell level
D. Immune memory strength.
3. Mathematical and graphical comparison between dentritic cell and immune networks.
5 RESEARCH METHODOLOGY
ALGORITHM DESIGN ( Dentritic Cell )
Its principle is taken up from the original dentritic cell mechanism in the human body with which our human immune system works. It generally takes advantage of the remembering power of our body in which if our body if exposed to a certain infection remembers it prevents it from harming us in at least near future, it also may cause permanent prevention.
ALGORITHM DESIGN ( Immune Networks )
Its principle is taken up from the immune network mechanism which does not have fixed idea for prevention of particular disease in all senses. It undoubted takes up a more robust way of finding the right vaccine or the attack example for actual prevention.
6 RESULTS AND CONCLUSION
Bar graph for less no of attacks
Bar for all attacks
Plot for less no. of attacks.
Plot for all attacks.
POINTS OF CONCLUSION
The accuracy varies with no. of attacks.
More the no. of attacks in DCT more is the accuracy.
Accuracy in INT is not dependent on no. of attacks.
Though the accuracy of the DCT is more but the response time of INT takes lead on DCT.
In terms of response time INT is much better than DCT.
DCT has time consuming behavior because of all internal processes which take place in it like updating memory cells and informing t cell etc.
Memory strength of DCT improves with no. of attacks and it is status quo in INT.
Fittest cell level show only local behavior of a part of the system having most immunity.
In short term goals INT is preferable because its less time consuming and can act quick. Also its cheaper as no internal processes prevail.
In long term goals DCT is preferred because of its stability.
We need to have a really fast system to implement DCT because of its time consumption
DCT is a central system because t cells keep record of all previous attacks and which is accessible to every part or ip in the network which makes DCT a central system.
7 REFERENCES
[1] Ruiying Zhou, Qiuhong Fan, Mingjun Wei, “Solving for Multimodal Function with High Dimensions Base on Hopfield Neural Network and Immune Algorithm”, IEEE 2011 International Conference on Electronic & Mechanical Engineering and Information Technology, Print ISBN- 978-1-61284-008-8, pp.3905-3908, 12-14 August 2011.
[2] Shi Xu-hua, Zhu Yu-guang, “Dynamic Cloning based immune network Algorithm for multi-modal Optimization”, IEEE, Seventh International Conference on Natural Computation, 2011, Print ISBN- 978-1-4244-9953-3, pp.522-525.
[3] Jun Fu, Huan Yang, “Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware Detection”, IEEE, Fifth International Symposium on Computational Intelligence and Design, 2012, Print ISBN- 978-0-7695-4811-1, DOI-10.1109/ISCID.2012.156, pp.18-22
[4] Song Yuan, Qi-juan Chen, “Dendritic Cell Algorithm for Anomaly Detection in Unordered Data Set”, 4th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2012, Print ISBN- 978-0-7695-4721-3, DOI-10.1109/IHMSC.2012.69, pp.249-252
[5] Shi Xuhua, Qian Fenq, “An Optimization Algorithm Based on Multi-population Artificial Immune Network”, IEEE, Fifth International Conference on Natural Computation, 2009, Print ISBN- 978-0-7695-3736-8, DOI-10.1109/ICNC.2009.574, pp.379-383
[6] Andrew Kusiak, Zijun Zhang, “Optimization of Power and its Variability with an Artificial Immune Network Algorithm”, IEEE, Print ISBN- 978-1-61284-788-7
[7] Antariksha Bhaduri, “A Mobile Robot Path Planning Using Genetic Artificial Immune Network Algorithm”, IEEE, World Congress on Nature and Biologically Inspired Computing, 2009, Print ISBN- 978-1-4244-5612-3, pp.1536-1539
[8] Yong Sun, Weigou Zhang, Meng Zhang, Dan Li, “Design on Neural Network Gain Scheduling Flight Control Law using a Modified PSO Algorithm based on Immune Clone Principle”, IEEE, Second International Conference on Intelligent Computation Technology and Automation, 2009, Print ISBN- 978-0-7695-3804-4, DOI-10.1109/ICICTA.2009.70, pp.259-263
[9] Chung-Ming Ou, C.R. Ou, “Immunity Inspired Host-Based Intrusion Detection Systems”, IEEE, Fifth International Conference on Genetic and Evolutionary Computing, 2011, Print ISBN- 978-0-7695-4449-6, DOI-10.1109/ICGEC.2011.70, pp.283-286
[10] Maizura Mokhtar, Ran Bi, Jon Timmis, Andy M. Tyrrell, “A Modified Dendritic Cell Algorithm for On-line Error Detection in Robotic Systems”, IEEE, Congress on Evolutionary Computation, 2009, Print ISBN- 978-1-4244-2959-2, pp.2055-2062
[11] Yunfeng Zhao, Yixin Yin, Dongmei Fu, Zhun Zhou, Ping Yin, Jia Wang, “Application of Improved Artificial Immune Network Algorithm to Optimization”, IEEE, 2008, Print ISBN- 978-1-4244-2386-6.
[12] Zhonghua Li, Jianming Li, Jieyeing Zhou, “An improved artificial immune network for multimodal function optimization”, IEEE, The 26th Chinese Control and Decision Conference, 2014, Print ISBN- 978-1-4799-3707-3, DOI-10.1109/CCDC.2014.6852268, pp.766-771, May 31st – June 2nd 2014.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download