{"id":239,"date":"2008-02-06T00:22:53","date_gmt":"2008-02-06T05:22:53","guid":{"rendered":"http:\/\/arxivblog.com\/?p=239"},"modified":"2008-02-06T00:22:54","modified_gmt":"2008-02-06T05:22:54","slug":"danger-theory-and-artificial-immune-systems","status":"publish","type":"post","link":"https:\/\/arxivblog.com\/?p=239","title":{"rendered":"Danger Theory and artificial immune systems"},"content":{"rendered":"<p> <a href=\"http:\/\/arxivblog.com\/wp-content\/uploads\/2008\/01\/danger-theory.jpg\" title=\"Danger Theory\"><img decoding=\"async\" src=\"http:\/\/arxivblog.com\/wp-content\/uploads\/2008\/01\/danger-theory.thumbnail.jpg\" alt=\"Danger Theory\" \/><\/a><\/p>\n<p>In recent years, various researchers have attempted to build computer security systems modelled on the human immune system. The idea is that if the system detects an invader, this triggers an immune response  that kills the foreigner.<\/p>\n<p>These systems don&#8217;t work terribly well, perhaps   because the human immune system doesn&#8217;t work like that either. In fact, nobody is quite sure how it works.<\/p>\n<p>However, a new idea called Danger Theory is sweeping through the field. It explains many of the subtleties and mysteries about how our immune systems work although it is still controversial.<\/p>\n<p>Now Uwe Aickelin from the University of Nottingham and a pal are suggesting, not unreasonably, that artificial immune systems should be designed to work in the same way.<\/p>\n<p>The basic idea behind Danger Theory is that the immune system reacts, not to foreign bodies, but to signs of danger. So it might react to the release of heat shock protein or the absence of signals that would usually be present.<\/p>\n<p>Danger Theory&#8217;s big USP  is that it explains why the immune system reacts to some foreign bodies such as bacteria in tehboold stream but not others, such as the food in our guts. It also explains why the immune system generally does not attack its host.<\/p>\n<p>Aickelin suggests that an artificial immune system for computer security might react to danger signals such as memory usage that is too high or too low, innappropriate disc activity and unexpected frequency of file changes. The system would then look for programmes that were active at the same time and check them for suspicious behaviour.<\/p>\n<p>It all sounds perfectly reasonable, but I for one will want to see em try and build one of these things. I suspect making it work well will be harder than it sounds.<\/p>\n<p>Ref: <a href=\"http:\/\/arxiv.org\/abs\/0801.3549\">arxiv.org\/abs\/0801.3549<\/a>: The Danger Theory and Its Application to Artificial Immune Systems<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, various researchers have attempted to build computer security systems modelled on the human immune system. The idea is that if the system detects an invader, this triggers an immune response that kills the foreigner. These systems don&#8217;t work terribly well, perhaps because the human immune system doesn&#8217;t work like that either. In [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,17],"tags":[],"class_list":["post-239","post","type-post","status-publish","format-standard","hentry","category-calculatin","category-slimey-stuff"],"_links":{"self":[{"href":"https:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/posts\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=239"}],"version-history":[{"count":0,"href":"https:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/posts\/239\/revisions"}],"wp:attachment":[{"href":"https:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}