applications of immune system computing
play

Applications of Immune System Computing Ricardo Hoar What kind of applications? l Computer Security l Pattern Recognition l Data Mining and Retrieval l Multi-Agent Systems l Design Optimization l Control Applications l Robotics l A

0 downloads 1 Views 388 KB Size Report
  1. Applications of Immune System Computing Ricardo Hoar

  2. What kind of applications? l Computer Security l Pattern Recognition l Data Mining and Retrieval l Multi-Agent Systems l Design Optimization l Control Applications l Robotics l …

  3. A Distributed Architecture for a Self Adaptive Computer Virus Immune System Gary B. Lamont, Robert E. Marmelstein, and David A. Van Veldhuizen l Simplified Biological IS Model (BIS) l Relationships between BIS and CVIS l CVIS model l Discussion of some algorithms involved in CVIS

  4. Simplified Biological IS Model l Extracellular BIS – High level set of interacting components: l Generator/Repressor – B-cells, antibodies l Detector – Detect antigen , detect host/non host l Classifier – Once antigen detected, B-cell determines type l Purger – Eg. Macrophage , antigen purging or cleansing l BIS memory – A store of successful B-cell threat responses l Adaptation process – Continual updating in reaction to imperfect coverage of all pathogens

  5. Extracellular BIS (Diagram)

  6. Intracellular BIS l Attempts to find antigens within living human cells. l Generate “Helper” T Cells which can promote antibody prodection from B cells l Antigen Presentation l Major Histocompatability Complex (recognition by T cells)

  7. Intracellular BIS (Diagram)

  8. Computer Virus l Significant Computer Threat l High “birth rate” of new viruses l Inability of Anti-Virus software to detect the newest Viruses.

  9. Current Methods for Virus Scanning l Current Virus scanning Software looks for bit patterns known to belong to a specific virus. Additionally deductive techniques use “rules of thumb” to identify programs that exhibit “virus like” behaviors. l Although reliable , these methods rely on static knowledge bases, resulting in a the need for continual updating.

  10. More robust method needed l Why not apply the principals from immune computing to this obvious application of scanning for Viruses? l Which components of BIS can be used to define a Computer Virus Immune System ? l What are the main implementation challenges?

  11. Computer Virus Immune System l Components – Genereate/Suppress Virus l Generate random signatures, Compare signatures to prior sig. – Classify Virus l Isolate virus based on its characteristics, signature extraction – Purge Virus l Purge the virus and repair damaged system resources – Augment Virus Database l If new virus, add to memory l Main Challenge – Replicating BIS inherent parallelism

  12. Generic CVIS Algorithm

  13. Self/Non-Self Determination l Distinguishing legitimate computer resources from those corrupted by a computer virus l Accomplished via detectors generated at random and compared to protected data l Requires a significant number of detectors l Can become cumbersome if protecting changing files due to creation of new detectors

  14. Self/Non-Self Determination Algorithm

  15. Virus Decoy l Uses decoy programs whose sole purpose is to become infected l Infected decoy can automatically extract viral signature l Does not require the regeneration with changing files l Must be used in conjunction with another method to identify classified viruses

  16. Virus Decoy Algorithm

  17. Immunity by Design: An Artificial Immune System Steven A. Hofmeyr and Stephanie Forrest

  18. ARCHITECTURE l To preserve generality, we represent both the protected system (self) and infectious agents (nonself) as dynamically changing sets of bit strings. l In cells of the body the profile of expressed proteins (self) changes over time, and likewise, we expect our set of protected strings to vary over time. l The body is subjected to different kinds of infections over time; we can view nonself as a dynamically changing set of strings.

  19. EXAMPLE: NETWORK SECURITY l We define self to be the set of normal pair wise connections (at the TCP/IP level) between computers. l A connection is defined in terms of its “data-path triple”—the source IP address, the destination IP address, and the service (or port) by which the computers communicate. (49 bit string) l Self signifies recognized familiar addresses while Non-self represents “foreign” addresses

  20. NETWORK SECURITY l Each detector cell is represented by a 49 bit string. l Detection = String Matching l New detectors are randomly generated and eliminated if they are matched while still immature (removal of self) l Mature detectors can activate an alarm if a threshold is reached or be removed if they remain unmatched. l This balance between naïve immature and mature cells gives the system adequate adaptability to new antigens.

  21. The Architecture of the AIS.

  22. Lifecycle of a detector

  23. EXPERIMENTAL RESULTS l Two data sets were collected: l The self set was collected over 50 days. l Self = 1.5 million datapaths mapped to 49-bit binary strings. l At time 0 in the simulation a synthetic attack was detected with probability p = 0.23. l After letting the system respond and adapt for 3 months attack detected with probability 0.76, demonstrating the effectiveness of AIS for learning

  24. Combinatorial Optimization (n-TSP Problem)

  25. Combinatorial Optimization (n-TSP Problem) l Endo et al . (1998) and Toma et al. (1999) proposed an adaptive optimization algorithm based on the immune network model and MHC peptide presentation . In this model, immune network principles were used to produce adaptive behaviors of agents and MHC was used to induce competitive behaviors among agents. The agents possessed a sensor, mimicking MHC peptide presentation by macrophages, the T-cells were used to control the behavior of agents and the B-cells were used to produce behaviors.

  26. Problem Comparison

  27. Refrences de Castro, L, Zuben, F. ARTIFICIAL IMMUNE SYSTEMS: PART II – A l SURVEY OF APPLICATIONS Technical Report DCA-RT 02/00 accessed from: http://www.cs.plu.edu/pub/faculty/spillman/seniorprojarts/ids/part2.pdf Hofmeyr, S., Forrest S. Immunity by Design: An Artificial Immune System l Lamont, G., Marmelstein R., Veldhuizen D. A Distributed Architecture for l a Self Adaptive Computer Virus Immune System New Ideas in Optimization Dasgupta, D. Artificial Immune systems: Theory and Applications Tutorial l WCCI 2002, Honolulu Hawaii.

Recommend Documents


2 nd destroys organisms that enter the body immune system
2 nd DESTROYS ORGANISMS THAT ENTER THE

BODYS DEFENSE MECHANISMS: 1 st PREVENTS ORGANISMS FROM ENTERING THE BODY SKIN

introduction introduction to to the human immune system
Introduction Introduction to to The

Introduction Introduction to to The Human Immune System The Human Immune

6
6 symptomatic rabies (2009)

Presentation by Dr Lindsay Nicholson LDA Conference 2011 Overview Immune

the lymphatic and immune systems
The Lymphatic and Immune Systems

The Lymphatic and Immune Systems Chapter 21 The Lymphatic and Immune

architecture of an artificial immune system
Architecture of an Artificial Immune

Architecture of an Artificial Immune System Steven A. Hofmeyr, S. Forrest

4 4 13
4/4/13 Why Do Clinical Studies on

4/4/13 Why Do Clinical Studies on Immune Products? The Regulatory and Immune

purelife
PURELIFE ANTI-INFLAMMATORY/ IMMUNE

PURELIFE ANTI-INFLAMMATORY/ IMMUNE SYSTEM SUPPORT PRESENTATION 1 IMMUNE

2 29 16
2/29/16 Adaptive Immune Responses to

2/29/16 Adaptive Immune Responses to Ranaviruses and Immune Evasion

managing life threatening
Managing Life - Threatening Allergies

Managing Life - Threatening Allergies in School Allergy Basics The role of

building immune defence priority research programme
Building Immune Defence Priority

Building Immune Defence Priority Research Programme Host Institution IMMUNE

virulence factors and their importance in pathology
Virulence factors and their importance

Virulence factors and their importance in pathology Andreas Peschel Cellular

using biacore t200 spr system
Using Biacore T200 SPR System

Principles of Immunogenicity Assessment Using Biacore T200 SPR System

update on adult
Update on Adult Describe 3 key

9/28/15 Objectives - Pharmacist Update on Adult Describe 3 key

learning objectives
Learning Objectives: Intro on the

Disclosure Future of Cancer Therapy: I have no relevant financial

university of utah
University of Utah Department of

University of Utah Department of Pathology Grand Rounds October 17, 2019

overcoming challenges in cellular analysis
Overcoming challenges in cellular

Webinar Series Overcoming challenges in cellular analysis Multiparameter

classes styles conflicts
Classes, Styles, Conflicts Analogies

Classes, Styles, Conflicts Didier Verna Classes, Styles, Conflicts

chapter 8 immune reactions to chronic viruses
Chapter 8: Immune reactions to

Chapter 8: Immune reactions to chronic viruses Theoretical Biology 2016

artificial immune systems artificial immune systems and
Artificial Immune Systems Artificial

Artificial Immune Systems Artificial Immune Systems and Data Mining: Bridging

11 5 2018
11/5/2018 FINDING SLIDES FOR TODAYS

11/5/2018 FINDING SLIDES FOR TODAYS WEBINAR COPE WEBINAR SERIES FOR HEALTH

using webex and webinar logistics
Using Webex and Webinar Logistics

Pre-application webinar for RFA-CA-20-038 and RFA-CA-20-039 Presentation will