Skip to main content

A Danger Theory Inspired Approach to Web Mining

  • Conference paper
Artificial Immune Systems (ICARIS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2787))

Included in the following conference series:

Abstract

Within immunology, new theories are constantly being proposed that challenge current ways of thinking. These include new theories regarding how the immune system responds to pathogenic material. This conceptual paper takes one relatively new such theory: the Danger theory, and explores the relevance of this theory to the application domain of web mining. Central to the idea of Danger theory is that of a context dependant response to invading pathogens. This paper argues that this context dependency could be utilised as powerful metaphor for applications in web mining. An illustrative example adaptive mailbox filter is presented that exploits properties of the immune system, including the Danger theory. This is essentially a dynamical classification task: a task that this paper argues is well suited to the field of artificial immune systems, particularly when drawing inspiration from the Danger theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  2. Dasgupta, D.: An overview of Artificial Immune Systems. In: Dasgupta, D. (ed.) Artificial Immune Systems and Their Applications, pp. 3–21. Springer, Heidelberg (1999)

    Google Scholar 

  3. Hunt, J.E., Cooke, D.E.: Learning using an artificial immune system. Journa of Network and Computer Applications 19(2), 189–212 (1996)

    Article  Google Scholar 

  4. Watkins, A.: AIRS: A resource limited artificial immune classifier. Masters Thesis, Mississippi State University (2001)

    Google Scholar 

  5. Watkins, A., Timmis, J.: Artificial Immune Recognition System (AIRS): Revisions and Refinements. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol. 5132, pp. 173–181. Springer, Heidelberg (2008)

    Google Scholar 

  6. Timmis, J., Neal, M.: A resource limited artificial immune system for data analysis. Knowledge Based Systems 14(3-4), 121–130 (2001)

    Article  Google Scholar 

  7. Timmis, J., Knight, T.: Artificial Immune Systems: Using The Immune System as Inspiration for Data Mining. In: Abbass, H.A., Sarker, R.A., Newton, C.S. (eds.) Data Mining: A Heuristic Approach, pp. 209–230. Idea Group Publishing (2002)

    Google Scholar 

  8. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison Wesley Longman, Amsterdam (1999)

    Google Scholar 

  9. Matzinger, P.: The Danger Model. A Renewed Sense of Self. Science 296, 301–305 (2002a)

    Google Scholar 

  10. Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, pp. 141–148 (2002)

    Google Scholar 

  11. Matzinger, P.: An Innate Sense of Danger. Seminars in Immunology 10(5), 399–415 (1998)

    Article  Google Scholar 

  12. Anderson, C., Matzinger, P.: Danger: The view from the bottom of the cliff. Seminars in Immunology 12(3), 231–238 (2000)

    Article  Google Scholar 

  13. Matzinger, P.: The Real Function of The Immune System or Tolerance and The Four D’s. Retrieved 30/10/2002 (2002b), from http://cmmg.biosci.wayne.edu/asg/polly.html

  14. Gallucci, S., Matzinger, P.: Danger signals: SOS to the immune system. Current Opinion in Immunology 13(1), 114–119 (2001)

    Article  Google Scholar 

  15. Williamson, M.M.: Biologically Inspired Approaches to Computer Security (HP Labs Technical Reports HPL-2002-131): HP Labs Bristol, UK (2002), Available from http://www.hpl.hp.com/techreports/2002/HPL-2002-131.html

  16. Burgess, M.: Computer Immunology. In: proceedings of The 12th Systems Administration Conference (LISA 1988),Boston, USA (1998)

    Google Scholar 

  17. Kim, J., Bentley, P.J.: An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: proceedings of The Genetic and Evolutionary Computation Conference 2001 (GECCO 2001), San Francisco, USA, July 7-11, pp. 1330–1337 (2001)

    Google Scholar 

  18. Chakrabarti, S.: Mining the web (Discovering Knowledge from Hypertext Data). Morgan Kaufmann, San Francisco (2003)

    Google Scholar 

  19. Linoff, G.S., Berry, M.J.A.: Mining the web (Transforming Customer Data into Customer Value). Wiley, Chichester (2001)

    Google Scholar 

  20. Nasraoui, O., Dasgupta, D., Gonzalez, F.: The Promise and Challenges of Artificial Immune System Based Web Usage Mining: Preliminary Results. In: proceedings of The SIAM Workshop on Web Analytics, Arlington, VA, pp. 29–39 (2002)

    Google Scholar 

  21. Twycross, J.: An Immune System Approach to Document Classification (HP Labs Technical Reports HPL-2002-288): HP Labs Bristol, UK (2002), Available from http://www.hpl.hp.com/techreports/2002/HPL-2002-288.html

  22. Twycross, J., Cayzer, S.: An Immune System Approach to Document Classification (HP Labs Technical Reports HPL-2002-292): HP Labs Bristol, UK (2002), Available from http://www.hpl.hp.com/techreports/2002/HPL-2002-292.html

  23. Blake, C.L., Merz, C.J.: UCI Repository of machine learning databases (1998) Retrieved 20 May 2003, from http://www.ics.uci.edu/~mlearn/MLRepository.html

  24. Diao, Y., Lu, H., Wu, D.: A comparative study of classification based personal e-mail filtering. In: Terano, T., Chen, A.L.P. (eds.) PAKDD 2000. LNCS, vol. 1805, pp. 408–419. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  25. Liu, B., Ma, Y., Yu, P.S.: Discovering unexpected information from your competitors web sites. In: proceedings of The Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2001), San Francisco, USA, pp. 144–153 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Secker, A., Freitas, A.A., Timmis, J. (2003). A Danger Theory Inspired Approach to Web Mining. In: Timmis, J., Bentley, P.J., Hart, E. (eds) Artificial Immune Systems. ICARIS 2003. Lecture Notes in Computer Science, vol 2787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45192-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45192-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40766-9

  • Online ISBN: 978-3-540-45192-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics