23,944 research outputs found
Information Fusion in the Immune System
Biologically-inspired methods such as evolutionary algorithms and neural
networks are proving useful in the field of information fusion. Artificial
Immune Systems (AISs) are a biologically-inspired approach which take
inspiration from the biological immune system. Interestingly, recent research
has show how AISs which use multi-level information sources as input data can
be used to build effective algorithms for real time computer intrusion
detection. This research is based on biological information fusion mechanisms
used by the human immune system and as such might be of interest to the
information fusion community. The aim of this paper is to present a summary of
some of the biological information fusion mechanisms seen in the human immune
system, and of how these mechanisms have been implemented as AISsComment: 10 pages, 6 tables, 6 figures, Information Fusio
Artificial immune system agent model
The Artificial Immune Systems (AIS) is a biologically inspired techniques that emulates a natural system, in particular the vertebrate immune system, in order to develop computational tools for solving engineering problems.Immunity-based technique emerge as a new branch of artificial intelligence (AI).The human biological immune system has become the source of inspiration for developing intelligent problem-solving techniques.The powerful information processing capabilities of the human system, such as feature extraction, pattern extraction, learning, memory and its distributive nature provide rich metaphors for its artificial counterpart. Hence, the goal of this study is to develop an Artificial Immune System (AIS) model using agent approach for incremental learning.The main issue handled was how to integrate a multiagent system into
an AIS application.This model proposed was simulated using cases for the performance measurement.The step by step activities performed in developing the agent based AIS model can be a guideline in developing an AIS application.
Besides that, the simulation of the AIS model can be further enhanced to be used for teaching and learning purposes
"Going back to our roots": second generation biocomputing
Researchers in the field of biocomputing have, for many years, successfully
"harvested and exploited" the natural world for inspiration in developing
systems that are robust, adaptable and capable of generating novel and even
"creative" solutions to human-defined problems. However, in this position paper
we argue that the time has now come for a reassessment of how we exploit
biology to generate new computational systems. Previous solutions (the "first
generation" of biocomputing techniques), whilst reasonably effective, are crude
analogues of actual biological systems. We believe that a new, inherently
inter-disciplinary approach is needed for the development of the emerging
"second generation" of bio-inspired methods. This new modus operandi will
require much closer interaction between the engineering and life sciences
communities, as well as a bidirectional flow of concepts, applications and
expertise. We support our argument by examining, in this new light, three
existing areas of biocomputing (genetic programming, artificial immune systems
and evolvable hardware), as well as an emerging area (natural genetic
engineering) which may provide useful pointers as to the way forward.Comment: Submitted to the International Journal of Unconventional Computin
Bioinspired Principles for Large-Scale Networked Sensor Systems: An Overview
Biology has often been used as a source of inspiration in computer science and engineering. Bioinspired principles have found their way into network node design and research due to the appealing analogies between biological systems and large networks of small sensors. This paper provides an overview of bioinspired principles and methods such as swarm intelligence, natural time synchronization, artificial immune system and intercellular information exchange applicable for sensor network design. Bioinspired principles and methods are discussed in the context of routing, clustering, time synchronization, optimal node deployment, localization and security and privacy
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
INTRODUCTION
In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become
increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement.
Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security,
have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high
level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will
improve the performance of real intrusion detection systems.
This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested
A Review on Biological Inspired Computation in Cryptology
Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study of breaking the cipher. Recently biological approaches provide inspiration in solving problems from various fields. This paper reviews major works in the application of biological inspired computational (BIC) paradigm in cryptology. The paper focuses on three BIC approaches, namely, genetic algorithm (GA), artificial neural network (ANN) and artificial immune system (AIS). The findings show that the research on applications of biological approaches in cryptology is minimal as compared to other fields. To date only ANN and GA have been used in cryptanalysis and design of cryptographic primitives and protocols. Based on similarities that AIS has with ANN and GA, this paper provides insights for potential application of AIS in cryptology for further research
- …