Discriminative power of the receptors activated by k-contiguous bits rule

The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer se...

Full description

Bibliographic Details
Main Author: Slawomir T. Wierzchon
Format: Article
Language:English
Published: Postgraduate Office, School of Computer Science, Universidad Nacional de La Plata 2000-10-01
Series:Journal of Computer Science and Technology
Subjects:
Online Access:https://journal.info.unlp.edu.ar/JCST/article/view/1007
_version_ 1818942089680912384
author Slawomir T. Wierzchon
author_facet Slawomir T. Wierzchon
author_sort Slawomir T. Wierzchon
collection DOAJ
description The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire.
first_indexed 2024-12-20T07:05:53Z
format Article
id doaj.art-88e1578bc4b34395abb83a901a28dee7
institution Directory Open Access Journal
issn 1666-6046
1666-6038
language English
last_indexed 2024-12-20T07:05:53Z
publishDate 2000-10-01
publisher Postgraduate Office, School of Computer Science, Universidad Nacional de La Plata
record_format Article
series Journal of Computer Science and Technology
spelling doaj.art-88e1578bc4b34395abb83a901a28dee72022-12-21T19:49:03ZengPostgraduate Office, School of Computer Science, Universidad Nacional de La PlataJournal of Computer Science and Technology1666-60461666-60382000-10-0110314 p.14 p.700Discriminative power of the receptors activated by k-contiguous bits ruleSlawomir T. Wierzchon0Dept. of Computer Science, Bialystok University of Technology, Bialystok, PolandThe paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire.https://journal.info.unlp.edu.ar/JCST/article/view/1007binary immune systemschemasbinary receptorsdetection probabilitylower bounds on failure probabilitymaximal detectability
spellingShingle Slawomir T. Wierzchon
Discriminative power of the receptors activated by k-contiguous bits rule
Journal of Computer Science and Technology
binary immune system
schemas
binary receptors
detection probability
lower bounds on failure probability
maximal detectability
title Discriminative power of the receptors activated by k-contiguous bits rule
title_full Discriminative power of the receptors activated by k-contiguous bits rule
title_fullStr Discriminative power of the receptors activated by k-contiguous bits rule
title_full_unstemmed Discriminative power of the receptors activated by k-contiguous bits rule
title_short Discriminative power of the receptors activated by k-contiguous bits rule
title_sort discriminative power of the receptors activated by k contiguous bits rule
topic binary immune system
schemas
binary receptors
detection probability
lower bounds on failure probability
maximal detectability
url https://journal.info.unlp.edu.ar/JCST/article/view/1007
work_keys_str_mv AT slawomirtwierzchon discriminativepowerofthereceptorsactivatedbykcontiguousbitsrule