Abstract
Within immunology, new theories are constantly being proposed that challenge current ways of thinking. These include new theories regarding how the immune system responds to pathogenic material. This conceptual paper takes one relatively new such theory: the Danger theory, and explores the relevance of this theory to the application domain of web mining. Central to the idea of Danger theory is that of a context dependant response to invading pathogens. This paper argues that this context dependency could be utilised as powerful metaphor for applications in web mining. An illustrative example adaptive mailbox filter is presented that exploits properties of the immune system, including the Danger theory. This is essentially a dynamical classification task: a task that this paper argues is well suited to the field of artificial immune systems, particularly when drawing inspiration from the Danger theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)
Dasgupta, D.: An overview of Artificial Immune Systems. In: Dasgupta, D. (ed.) Artificial Immune Systems and Their Applications, pp. 3–21. Springer, Heidelberg (1999)
Hunt, J.E., Cooke, D.E.: Learning using an artificial immune system. Journa of Network and Computer Applications 19(2), 189–212 (1996)
Watkins, A.: AIRS: A resource limited artificial immune classifier. Masters Thesis, Mississippi State University (2001)
Watkins, A., Timmis, J.: Artificial Immune Recognition System (AIRS): Revisions and Refinements. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol. 5132, pp. 173–181. Springer, Heidelberg (2008)
Timmis, J., Neal, M.: A resource limited artificial immune system for data analysis. Knowledge Based Systems 14(3-4), 121–130 (2001)
Timmis, J., Knight, T.: Artificial Immune Systems: Using The Immune System as Inspiration for Data Mining. In: Abbass, H.A., Sarker, R.A., Newton, C.S. (eds.) Data Mining: A Heuristic Approach, pp. 209–230. Idea Group Publishing (2002)
Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison Wesley Longman, Amsterdam (1999)
Matzinger, P.: The Danger Model. A Renewed Sense of Self. Science 296, 301–305 (2002a)
Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, pp. 141–148 (2002)
Matzinger, P.: An Innate Sense of Danger. Seminars in Immunology 10(5), 399–415 (1998)
Anderson, C., Matzinger, P.: Danger: The view from the bottom of the cliff. Seminars in Immunology 12(3), 231–238 (2000)
Matzinger, P.: The Real Function of The Immune System or Tolerance and The Four D’s. Retrieved 30/10/2002 (2002b), from http://cmmg.biosci.wayne.edu/asg/polly.html
Gallucci, S., Matzinger, P.: Danger signals: SOS to the immune system. Current Opinion in Immunology 13(1), 114–119 (2001)
Williamson, M.M.: Biologically Inspired Approaches to Computer Security (HP Labs Technical Reports HPL-2002-131): HP Labs Bristol, UK (2002), Available from http://www.hpl.hp.com/techreports/2002/HPL-2002-131.html
Burgess, M.: Computer Immunology. In: proceedings of The 12th Systems Administration Conference (LISA 1988),Boston, USA (1998)
Kim, J., Bentley, P.J.: An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: proceedings of The Genetic and Evolutionary Computation Conference 2001 (GECCO 2001), San Francisco, USA, July 7-11, pp. 1330–1337 (2001)
Chakrabarti, S.: Mining the web (Discovering Knowledge from Hypertext Data). Morgan Kaufmann, San Francisco (2003)
Linoff, G.S., Berry, M.J.A.: Mining the web (Transforming Customer Data into Customer Value). Wiley, Chichester (2001)
Nasraoui, O., Dasgupta, D., Gonzalez, F.: The Promise and Challenges of Artificial Immune System Based Web Usage Mining: Preliminary Results. In: proceedings of The SIAM Workshop on Web Analytics, Arlington, VA, pp. 29–39 (2002)
Twycross, J.: An Immune System Approach to Document Classification (HP Labs Technical Reports HPL-2002-288): HP Labs Bristol, UK (2002), Available from http://www.hpl.hp.com/techreports/2002/HPL-2002-288.html
Twycross, J., Cayzer, S.: An Immune System Approach to Document Classification (HP Labs Technical Reports HPL-2002-292): HP Labs Bristol, UK (2002), Available from http://www.hpl.hp.com/techreports/2002/HPL-2002-292.html
Blake, C.L., Merz, C.J.: UCI Repository of machine learning databases (1998) Retrieved 20 May 2003, from http://www.ics.uci.edu/~mlearn/MLRepository.html
Diao, Y., Lu, H., Wu, D.: A comparative study of classification based personal e-mail filtering. In: Terano, T., Chen, A.L.P. (eds.) PAKDD 2000. LNCS, vol. 1805, pp. 408–419. Springer, Heidelberg (2000)
Liu, B., Ma, Y., Yu, P.S.: Discovering unexpected information from your competitors web sites. In: proceedings of The Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2001), San Francisco, USA, pp. 144–153 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Secker, A., Freitas, A.A., Timmis, J. (2003). A Danger Theory Inspired Approach to Web Mining. In: Timmis, J., Bentley, P.J., Hart, E. (eds) Artificial Immune Systems. ICARIS 2003. Lecture Notes in Computer Science, vol 2787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45192-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-45192-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40766-9
Online ISBN: 978-3-540-45192-1
eBook Packages: Springer Book Archive