Discriminative power of the receptors activated by k-contiguous bits rule
The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer se...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Postgraduate Office, School of Computer Science, Universidad Nacional de La Plata
2000-10-01
|
Series: | Journal of Computer Science and Technology |
Subjects: | |
Online Access: | https://journal.info.unlp.edu.ar/JCST/article/view/1007 |
_version_ | 1818942089680912384 |
---|---|
author | Slawomir T. Wierzchon |
author_facet | Slawomir T. Wierzchon |
author_sort | Slawomir T. Wierzchon |
collection | DOAJ |
description | The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire. |
first_indexed | 2024-12-20T07:05:53Z |
format | Article |
id | doaj.art-88e1578bc4b34395abb83a901a28dee7 |
institution | Directory Open Access Journal |
issn | 1666-6046 1666-6038 |
language | English |
last_indexed | 2024-12-20T07:05:53Z |
publishDate | 2000-10-01 |
publisher | Postgraduate Office, School of Computer Science, Universidad Nacional de La Plata |
record_format | Article |
series | Journal of Computer Science and Technology |
spelling | doaj.art-88e1578bc4b34395abb83a901a28dee72022-12-21T19:49:03ZengPostgraduate Office, School of Computer Science, Universidad Nacional de La PlataJournal of Computer Science and Technology1666-60461666-60382000-10-0110314 p.14 p.700Discriminative power of the receptors activated by k-contiguous bits ruleSlawomir T. Wierzchon0Dept. of Computer Science, Bialystok University of Technology, Bialystok, PolandThe paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire.https://journal.info.unlp.edu.ar/JCST/article/view/1007binary immune systemschemasbinary receptorsdetection probabilitylower bounds on failure probabilitymaximal detectability |
spellingShingle | Slawomir T. Wierzchon Discriminative power of the receptors activated by k-contiguous bits rule Journal of Computer Science and Technology binary immune system schemas binary receptors detection probability lower bounds on failure probability maximal detectability |
title | Discriminative power of the receptors activated by k-contiguous bits rule |
title_full | Discriminative power of the receptors activated by k-contiguous bits rule |
title_fullStr | Discriminative power of the receptors activated by k-contiguous bits rule |
title_full_unstemmed | Discriminative power of the receptors activated by k-contiguous bits rule |
title_short | Discriminative power of the receptors activated by k-contiguous bits rule |
title_sort | discriminative power of the receptors activated by k contiguous bits rule |
topic | binary immune system schemas binary receptors detection probability lower bounds on failure probability maximal detectability |
url | https://journal.info.unlp.edu.ar/JCST/article/view/1007 |
work_keys_str_mv | AT slawomirtwierzchon discriminativepowerofthereceptorsactivatedbykcontiguousbitsrule |