
446 19. Artificial Immune Models
generate these detectors.
Observations in the buffer are presented to existing detectors. If an existing detector
matches an observation, the score of the detector is rewarded with a value of one;
otherwise, it is penalized with a value of one. A detector can only match an observation
if the observation is accompanied by a danger signal. Detectors are clustered according
to their detection scores. If a source node experience a packet loss (misbehaving node),
the source node will generate an observation with a danger signal along the route
where the packet loss was experienced. The action taken by the neighboring nodes is
to discard the observation from the buffered observations through correlation with the
danger signal (also observed). This prevents the generation of detectors on non-self
observations.
19.5.2 An Adaptive Mailbox
The danger theory inspired the proposal of an AIS for an adaptive mailbox. The
proposed AIS in [772] classifies interesting from uninteresting emails. The algorithm
is divided into two phases: an initialization phase (training) and a running phase
(testing).
Algorithm 19.9 summarizes the initialization phase. The initialization phase monitors
the user’s actions for each new email, z, received. If z is deleted by the user, an anti-
body, y
new
, is generated to detect the deleted email. After adding the new antibody
to the antibody set, B, the existing antibodies in the set are cloned and mutated to
improve the generalization of the antibody set. Thus, the antibody set, B, represents
uninteresting email. The initialization phase continuous until the size of the antibody
set, B, reached a certain maximum, n
a
.
Algorithm 19.9 Initialization Phase for an Adaptive Mailbox
while |B| <n
a
do
if user action = delete email, z, then
Generate an antibody, y
new
,fromz;
Add, y
new
, to the set of antibodies, B;
for each antibody, y
j
∈Bdo
Clone and mutate antibody, y
j
, to maximize affinity with antibody, y
new
;
Add, n
h
, highest affinity clones to B;
end
end
end
The running phase (see Algorithm 19.10) labels all incoming email, z, that are deleted
by the user as uninteresting and buffers them as antigen in D
T
. When the buffered
emails reach a specific size, n
T
, the buffer, D
T
, is presented to the antibody set, B.
The antibody set then adapts to the presented buffer of emails (antigens) through
clonal selection. Thus, the antibody set, B, adapts to the changing interest of the user
to represent the latest general set of antibodies (uninteresting emails).