Week 11 - Artificial Immune Systems Flashcards
What is an AIS (Artificial Immune System)?
Using the natural immune system as a metaphor for solving computational problems (not modelling the actual immune system, which is too difficult)
Name some applications of AIS.
Fault detection, computer security, novelty detection, robot behaviour, machine learning
What are the two non-specific lines of defence in the human immune system?
Barriers and general attack
What are the two specific (adapted/targeted) defences in the human immune system?
Primary immune response (launches a response to invading pathogens)
Secondary immune response (remembers past encounters, leading to faster response the second time around)
What is a pathogen?
Any agent (bacterium, virus etc) that can cause problems
What are nonspecific defences?
The body’s first line against disease. They are not directed against a particular pathogen. They guard against all infections, regardless of cause
What are specific defences?
Attempts by the body to defend itself against particular pathogens
What is the body’s most important nonspecific defence and why?
The skin as it provides a continuous layer that protects almost the whole body, very few pathogens can penetrate the layers of dead cells at the skin’s surface, and oil and sweat glands at the surface of the skin produce a salty and acidic environment that kills many bacteria and other microorganisms. It acts as a barrier
Name some non-specific defences other than the skin. How do they work?
Mucous membranes (tissues that protect the interior surfaces of the body that may be exposed to pathogens, serving as a barrier and secreting mucus, a sticky fluid that traps pathogens)
Mucus, cilia and hairs in the nose and throat (trap viruses and bacteria)
Stomach acid (destroys pathogens alongside enzymes)
Body secretions (such as mucus, saliva, sweat and tears - contain lysozyme, an enzyme that breaks down the cell wall of many bacterium)
The body’s second line of defence is the inflammatory response. How does this work?
Triggered by injury to tissues in the body
The injured cells release a protein called histamine, which starts a series of changes called the inflammatory response
Blood flow is increased to the area
Capillaries leak, releasing phagocytes and clotting factors into the wound
Phagocytes engulf bacteria, dead cells, and cellular debris
Platelets move out of the capillary to seal the wounded area
What is the most common phagocyte and what are some properties of it?
Neutrophil - 50-70% of the white blood cells in the body
Small so can move between cells
Engulfs pathogens
Name another phagocyte other than neutrophil. What are some of its properties?
Macrophage
Consumes and destroys any pathogens it encounters
Rids the body of worn out cells and cellular debris
What does a natural killer cell do?
Punctures the cell membrane of its target cell, allowing water to run into the cell so it bursts
This is effective in killing cancer cells and cells infected with viruses as it attacks cells infected with pathogens, not the pathogens themselves
What is an antigen?
A substance that triggers the specific defences of the immune system - a substance that a macrophage identifies as not belonging to the body
What are the main organs in the immune response and what do they do?
Bone marrow - manufactures the billions of white blood cells (WBC) needed by the body every day. Some newly produced WBC remain in the bone marrow to mature and specialise, whereas others travel to the thymus to mature
Lymph nodes - filter pathogens from the lymph and expose them to white blood cells
Spleen - filters pathogens from the blood. Stocked with WBC that respond to the trapped pathogens
What is a lymphocyte?
A white blood cell that activate the immune reponse
What are the two main types of lymphocytes?
B Cells and T Cells
What do B-Lymphocytes (B Cells) do?
Produced and matured in the bone marrow, they are responsible for producing antibodies
What are antibodies?
Special proteins that can bind to the antigen on the surface of a pathogen and help destroy it
What do T-Lymphocytes (T Cells) do?
Matured in the thymus and have a variety of roles:
1. Cytotoxic T-Cells directly kill invaders
2. Helper T-Cells help other B and T cells do their job (e.g. they can “scan” body cells for signs of infection and increase B-Cell response if they find some)
3. Suppressor T-Cells suppress the activity of other B and T cells so that they don’t overreact
What is the primary part of the adaptive immune response?
B and T cells develop the capability to generate antibodies to destroy or disable the pathogen (takes 3-7 days)
Cells also go through somatic hypermutation to ensure coverage of similar (not just identical) antigens
What is the secondary part of the immune response?
Happens on encountering a similar antigen again
Occurs much faster because some B-cells from the primary response remain
These cells “remember” how to make the antibodies to destroy the pathogen
Name 5 important properties of the immune system.
- Recognition - can determine harmful from non-harmful and self from non-self
- Distributed and self regulating - no central control
- Diversity - almost infinite possible antibodies
- Learning and memory - “remembers” old encounters with antigens
- Metadynamics - non-used cells discarded, new cells created continuously
What are three uses for AIS?
Machine learning, data mining, cyber security
When were AIS’s first proposed and who by?
1995 by Cooke and Hunt
What did Watkins and Timmis propose in 2004 and what does it do?
Artificial Immune Recognition Systems (AIRS) - uses immune system metaphors to classify examples in a training dataset
What properties does an immune system approach to computer security need to include?
Distributed nature (lymphocytes find evidence of infection locally)
Diversity (keeping systems diverse means less likely to spread a virus/be vulnerable to attack)
Adaptability (new viruses/methods of attack should be recognised in the system)
Anomaly detection (difficult topic in computing)
Numbers (human immune systems must react quickly to large numbers of pathogens, AIS must deal with denial of service attacks)
What three principles does Forrest et al’s 1994 matching algorithm solution to self/non-self distinction involve?
- Each machine/copy of software has a unique copy of the protection algorithm (if you have one copy, if it is compromised, every computer will be vulnerable)
- Detection is probabilistic (to make each piece of software different, use probabilistic of stochastic approach)
- A robust system should look for any foreign activity not known signatures (traditional virus detection software is only as good as its recent update - a robust system should be able to think outside the box)
How does Forrest et al’s 1994 matching algorithm solution to self/non-self distinction work?
Set of “self” strings generated from an alphabet
Set of “detectors” to protect the “self” strings
Each detector created by generating a random substring from one of the “self” strings, censored to ensure it is not also a “self” string
Matching occurs as a continual process - matching protected strings against detector collection (matching is not absolute)
If a detector matches a string, it has changed and an anomaly is detected