Clonal Selection Method for Immuntiy Based Intrusion Detection Systems

Total Page:16

File Type:pdf, Size:1020Kb

Clonal Selection Method for Immuntiy Based Intrusion Detection Systems Clonal Selection Method for Immuntiy based Intrusion Detection Systems by Kasthurirangan Parthasarathy Abstract This Paper presents a description of an intrusion detection ap- proach modeled on the basis of two bio-inspired concepts namely, negative selection and clonal selection. The negative selection mechanism of the im- mune system can detect the foreign patterns in the complement(nonself) space. The clonal selection principle is used to explain the basic features of an adaptive immune response to an antigenic stimulus. It establishes the idea that only those cells that recognize the antigens are selected to proliferate. The selected cells are subject to affinity maturation process, which improves their affinity to the selective antigens. The MODCLONALG algorithm de- scribed in this paper, is a special refinement of the clonal selection principle, that attempts to implement the negative selection mechanism. A detailed discussion of the MODCLONALG to generate the rule sets representing the negative selection(nonself) is provided. Finally, an Intrusion Detection Sys- tem model is proposed that incorporates a knowledge base constructed by CLONALG using negative selection and uses CLONALG for recognition of the malicious activities in the system. Keywords Artificial immune system, negative selection principle, clonal selection principle, evolutionary algorithms, optimization, intrusion detec- tion. 1 Introduction Computer Security is a field that has gained significance over the past few years, especially with the widespread internetworking of computers. One of the important aspects of computer security is the detection of intrusions and attacks. Hence, considerable amount of research works have been dedicated to the exploration of various possible methods for detection of intrusions and 1 attacks. Of late, the intrusion detection systems, modeled on the basis of the Artificial Immune System, have gained prominence because of their promise to provide for feasible and efficient detection mechanisms[4]. The Artificial Immune System is modeled on the basis of the Natural Immune System found in living organisms. In this paper, an Intrusion Detection System is proposed which makes use of the negative selection mechanism of the immune system along with the clonal selection principle. The main objective is to combine the clonal selection method with negative selection to obtain a comprehensive definition of the nonself space. The nonself space represents a set of activities in a system that are considered to be abnormal or undesirable. This is hence the complement of the self space which represents a set of activities that are considered normal in the system. The clonal selection method is a refined form of evolutionary approaches which are stochastic search processes. The definition of self or nonself have combinatorial possibilities and hence the search space is vast. Conventional deterministic approaches cannot provide complete coverage of such a search space in real time. Hence,the evolutionary approach, with its stochastic nature, provides a reasonably efficient method to develop a representation of self or nonself that can cover the enormous search space[1].These evolutionary algorithms are modeled on the basis of Natural Evolution, where in the fittest of the individuals are selected for reproduction and they recombine to produce unique offspring with mutation to add diversity to their characteristics. The clonal selection principle makes use of these features but with a slight modification that allows it to handle the cases of multimodal optimization much more efficiently[2]. The MODCLONALG discussed in this paper, is a specialized form of a clonal selection algorithm, that generates a set of rules charecterizing the complement(nonself) space. The Intrusion Detection System model proposed makes use of this algorithm to build its knowledge base. The pattern recog- nition tasks of the system are performed by the CLONALG which is another form of a clonal selection algorithm. 2 Artificial Immune Systems Artificial Immune Systems (AIS) form the basis of solutions for various real world problems and in particular intrusion detection. AIS aim at using ideas gleaned from immunology in order to develop systems capable of performing a wide range of tasks in various research areas. This is basically a refinement of the Natural Immune System built into the living organisms, specifically directed at information processing. 2 When a pathogen (a germ) enters the body of an organism, the immune system immediately recognizes that the pathogens cell formulation is different from that of the body cells. The Germinal Center (GC) plays an important role in this activity and takes over to tackle the situation. It is one of the functional modules of the natural immune systems, which evolves in some organs and plays a major role in immune response. The development of a GC is a complex process, which is formed dynamically when antigen-activated B-Cells migrate into primary follicles of the peripheral lymphoid organs. The formation of GC requires activation of B-Cells, Migration of B-Cells, T and B Cell Interactions, and the availability of the network of follicular denritic cells (FD). From the information processing point of view, the role of the germinal center can be used as a pattern matching model, particularly, to distinguish between the known patterns and novel patterns. There are various concepts in the Artificial Immune System like, Clonal Selection, Affinity Maturation, Somatic Mutation, Receptor Editing that are discussed in relation to the detection of intrusions in this paper. 3 Intrusion Detection Intrusion detection is a problem related with the field of Computer Secu- rity where in the computer systems are guarded against malicious activities and attacks. There are various forms of security breach like, virus activity, masqueraded user, denial of service attacks etc. The ’Intrusion Detection Systems’ continually monitor the state of the system and raise alarms when any suspicious activities occur in the system. These systems are best mod- eled with a tremendous amount of motivation from the Artificial Immune Systems. The conventional intrusion detection systems are built by incorporating a knowledge base with the system that provides a comprehensive definition of normal activities called Self so that the system can use it to differentiate unusual activities which are categorized as nonself. The system activities can be classified in to: 1. Normal 2. Attack 3. Error 4. Abnormalities 3 The normal activities can be recorded and on the basis of the collected information, a definition of normal behaviour in the system is created as a statistical average of all the recorded activities. The system can then be monitored continuously to record the current activities which are compared with the normal behaviour and depending upon the level of deviation can be classified further into attacks or errors or abnormalities. 3.1 Representation of the Self and Non-Self The main purpose of intrusion detection is to identify which states of a system are normal and which are abnormal.The states of a system can be represented by a set of features. System State Space[1]: A state of the system is represented by a vector i i i n of features x = (x1; :::; xn)²[0; 0; 1:0] . The space of states is represented by the set S ⊆ [0:0; 1:0]n. It includes the feature vectors corresponding to all possible states of the system. Normal Subspace[1]: A set of feature vectors Self ⊆ S represents the normal states of the system.Its complement is called Nonself and is defined as Nonself = S ¡ Self. Thus the charecteristic function for Self definition would be: n XSelf : [0:0; 1:0] ! 0; 1 If various levels of normalcy are to be represented then the definition can be modified such that: n XSelf : [0:0; 1:0] ! [0:0; 1:0] The problem[1]: Given a set of normal spaces Self 0 ⊆ Self, a good estimate of the normal space charecteristic function xSelf needs to be built. This function should be able to decide whether or not the observed state of the system is anamalous. 3.2 Negative Selection Approach in Intrusion Detec- tion Intrusion Detection systems need to distinguish between the self and nonself space. Also, the nonself space elements must be further categorized in or- der to determine specific response for protection and recovery from different attacks. The negative selection mechanism in the immune system works in 4 such a way that when the antibody cells generated bind to the self-protein, they are destroyed, so only those cells which do not bind to self proteins are allowed to proliferate. This approach is extended to the intrusion detection process and a negative selection algorithm has been arrived at[1]. The Negative Selection algorithm[1] can be summarized as: 1. Define Self as collection of strings of length l over a finite alphabet, a collection that needs to be monitored. 2. Generate a set of R detectors, each of which fails to match any string in s. 3. Monitor S for changes by continually matching the detectors in R against S. If any detector ever matches, then a change is known to have occured as the detectors are designed to not match any of the original strings in s. These detectors can be represented as a set of real-valued rules.These rules constitute a complement of the normal values of the feature vectors(described below). A rule is considered good if it does not cover positive samples and its area is large. Thus, an evolutionary algorithm can be used to evolve the rules to cover the nonself space guided by this criterion. The basic structure of the detector rules is as follows: 1 R :If Cond1, then Level1 . i R :If Condi, then Level1 . i+1 R :If Condi+1, then Level2 . j R :If Condj, then Level 2 . where i i i i Condi = x1 2 [low1; high1] and : : : and xn 2 [lown; highn]; (x1; : : : ; xn) - feauture vector; j j [lowi ; highi ] : lower and upper values for the feature xi in the condition part of the rule Rj 5 The condition part of each rule defines a hypercube in the descriptor space ([0:0; 1:0]n).
Recommended publications
  • Ch. 43 the Immune System
    Ch. 43 The Immune System 1 Essential Questions: How does our immunity arise? How does our immune system work? 2 Overview of immunity: Two kinds of defense: A. innate immunity ­ present at time of birth before exposed to pathogens ­nonspecific responses, broad in range ­skin and mucous membranes ­internal cellular and chemical defenses that get through skin ­macrophages, phagocytic cells B. acquired immunity­ (adaptive immunity)­develops after exposure to specific microbes, abnormal body cells, foreign substances or toxins ­highly specific ­lymphocytes ­ produce antibodies or directly destroy cells 3 Overview of Immune System nonspecific Specific 4 I. Innate immunity ­ Nonspecific defenses A. First line of defense: skin, mucous membranes ­skin protects against chemical, mechanical, pathogenic, UV light damage ­mucous membranes line digestive, respiratory, and genitourinary tracts ­ prevent pathogens by trapping in mucus *breaks in skin or mucous membranes = entryway for pathogen 5 secretions of skin also protect against microbes ­sebaceous and sweat glands keep pH at 3­5 ­stomach also secretes HCl (Hepatitis A virus can get past this) ­produce antimicrobial proteins (lysozyme) ­ ex. in tears http://vrc.belfastinstitute.ac.uk/resources/skin/skin.htm 6 B. Second line of defense­ internal cellular and chemical defenses (still nonspecific) ­phagocytes ­produce antimicrobial proteins and initiate inflammation (helps limit spread of microbes) ­bind to receptor sites on microbe, then engulfs microbe, which fused with lysosome ­nitric oxide and poisons in lysosome can poison microbe ­lysozyme and other enzymes degrade the microbe *some bacteria have capsule that prevents attachment *some bacteria are resistant to lysozyme macrophages 7 Cellular Innate defenses Toll­like receptor (TLR) recognize fragments of molecules characteristic of a set of pathogens [Ex.
    [Show full text]
  • The RAG Recombinase Dictates Functional Heterogeneity and Cellular Fitness in Natural Killer Cells
    The RAG Recombinase Dictates Functional Heterogeneity and Cellular Fitness in Natural Killer Cells Jenny M. Karo,1 David G. Schatz,2 and Joseph C. Sun1,* 1Immunology Program and Gerstner Sloan Kettering Graduate School of Biomedical Sciences, Memorial Sloan Kettering Cancer Center, New York, NY 10065, USA 2Department of Immunobiology and the Howard Hughes Medical Institute, Yale University School of Medicine, New Haven, CT 06510, USA *Correspondence: [email protected] http://dx.doi.org/10.1016/j.cell.2014.08.026 SUMMARY completely absent (Mombaerts et al., 1992; Shinkai et al., 1992). There is as yet no evidence that RAG plays a physiological The emergence of recombination-activating genes role in any cell type other than B and T lymphocytes or in any pro- (RAGs) in jawed vertebrates endowed adaptive cess other than V(D)J recombination. immune cells with the ability to assemble a diverse Although NK cells have long been classified as a component set of antigen receptor genes. In contrast, innate of the innate immune system, recent evidence suggests that lymphocytes, such as natural killer (NK) cells, are this cell type possesses traits attributable to adaptive immunity not believed to require RAGs. Here, we report that (Sun and Lanier, 2011). These characteristics include ‘‘educa- tion’’ mechanisms to ensure self-tolerance during NK cell devel- NK cells unable to express RAGs or RAG endonu- opment and clonal-like expansion of antigen-specific NK clease activity during ontogeny exhibit a cell-intrinsic cells during viral infection, followed by the ability to generate hyperresponsiveness but a diminished capacity long-lived ‘‘memory’’ NK cells.
    [Show full text]
  • LECTURE 05 Acquired Immunity and Clonal Selection
    LECTURE: 05 Title: ACQUIRED "ADAPTIVE" IMMUNITY & CLONAL SELECTION THEROY LEARNING OBJECTIVES: The student should be able to: • Recognize that, acquired or adaptive immunity is a specific immunity. • Explain the mechanism of development of the specific immunity. • Enumerate the components of the specific immunity such as A. Primary immune response. B. Secondary immune response • Explain the different phases that are included in the primary and secondary immune responses such as: A. The induction phase. B. Exponential phase. C. Steady phase. D. Decline phase. • Compare between the phases of the primary and secondary immune responses. • Determine the type of the immunoglobulins involved in each phase. • Determine which immunoglobulin is induced first and, that last longer. • Enumerate the characteristics of the specific immunity such as: A. The ability to distinguish self from non-self. B. Specificity. C. Immunological memory. • Explain naturally and artificially acquired immunity (passive, and active). • Explain the two interrelated and independent mechanisms of the specific immune response such as : A. Humoral immunity. B. Cell-mediated (cellular) immunity. • Recognize that, the specific immunity is not always protective, for example; sometimes it causes allergies (hay fever), or it may be directed against one of the body’s own constituents, resulting in autoimmunity (thyroditis). LECTURE REFRENCE: 1. TEXTBOOK: ROITT, BROSTOFF, MALE IMMUNOLOGY. 6th edition. Chapter 2. pp. 15-31 2. TEXTBOOK: ABUL K. ABBAS. ANDREW H. LICHTMAN. CELLULAR AND MOLECULAR IMMUNOLOGY. 5TH EDITION. Chapter 1. pg 3-12. 1 ACQUIRED (SPECIFIC) IMMUNITY INTRODUCTION Adaptive immunity is created after an interaction of lymphocytes with particular foreign substances which are recognized specifically by those lymphocytes.
    [Show full text]
  • Med-Pathway Zoom Workshop
    MCAT Immunology Dr. Phillip Carpenter medpathwaymcat Med-pathway AAMC MCAT Content Outline: Immunology Category 1A: Structure/Function of Proteins/AA Immune System Category 3B: Organ Systems Innate vs. Adaptive Immunity T and B Lymphocytes Macrophages & Phagocytes Tissue-Bone marrow, Spleen, Thymus, Lymph nodes Antigen and Antibody Antigen Presentation Clonal Selection Antigen-Antibody recognition Structure of antibody molecule Self vs. Non-self, Autoimmune Diseases Major Histocompatibility Complex Lab Techniques: ELISA & Western Blotting Hematopoiesis Creates Immune Cells Self vs. Non-self Innate vs Adaptive Innate Immunity Physical Barriers: Skin, mucous membranes, pH Inflammatory mediators: Complement, Cytokines, Prostaglandins Cellular Components: Phagocytes-Neutrophils, Eosinophils, Basophils, Mast Cells Antigen Presenting Cells-Monocytes, Macrophages, Dendritic Cells Adaptive (Acquired) Immunity Composed of B and T lymphocytes: Activated by Innate Immunity B cells: Express B cell receptor and secrete antibodies as plasma cells T cells: Mature in thymus, express TCR surface receptor; Activated by Antigen Presenting Cells (APCs) Direct Immune response (The Ringleaders of immune system) Major Lymphoid Organs TYPE SITE FUNCTION Fetal production of Liver 1° lymphoid cells Hematopoietic production of 1° Bone marrow myeloid and lymphoid cells Receives bone marrow T 1° Thymus cells; site where self is selected from non-self Lymph nodes 2° Sites of antigen activation Spleen of lymphocytes; clearance Macrophages (Sentinel Cells) Pattern Recognition
    [Show full text]
  • Theories of Antibodies Production
    THEORIES OF ANTIBODIES PRODUCTION 1. Instructive Theories a. Direct Template Theory b. Indirect Template Theory 2. Selective Theories a. Natural Selection Theory b. Side Chain Theory c. Clonal Selection Theory d. Immune Network Theory INSTRUCTIVE THEORIES Instructive theories suggest that an immunocompetent cell is capable of synthesizing antibodies of all specificity. The antigen directs the immunocompetent cell to produce complementary antibodies. According to these theories the antigen play a central role in determining the specificity of antibody molecule. Two instructive theories are postulated as follows: Direct template theory: This theory was first postulated by Breinl and Haurowitz (1930). They suggested that a particular antigen or antigenic determinants would serve as a template against which antibodies would fold. The antibody molecule would thereby assume a configuration complementary to antigen template. This theory was further advanced as Direct Template Theory by Linus Pauling in 1940s. Indirect template theory: This theory was first postulated by Burnet and Fenner (1949). They suggested that the entry of antigenic determinants into the antibody producing cells induced a heritable change in these cells. A genocopy of the antigenic determinant was incorporated in genome of these cells and transmitted to the progeny cells. However, this theory that tried to explain specificity and secondary responses is no longer accepted. SELECTIVE THEORIES Selective theories suggest that it is not antigen, but the antibody molecule that play a central role in determining its specificity. The immune system already possess pre-formed antibodies of different specificities prior to encounter with an antigen. Three selective theories were postulated as follows: Side chain theory: This theory was proposed by Ehrlich (1898).
    [Show full text]
  • A Series of Adaptive Models Inspired by the Acquired Immune System
    A Series of Adaptive Models Inspired by the Acquired Immune System JASON BROWNLEE Technical Report 070227A Complex Intelligent Systems Laboratory, Centre for Information Technology Research, Faculty of Information Communication Technology, Swinburne University of Technology Melbourne, Australia [email protected] Abstract-The acquired immune system is capable of the presented series of adaptive models as a novel specialising a defence of an organism in response to the its hierarchal framework for which existing and future antigenic environment. This complex biological system possess acquired immunity inspired adaptive models may be interesting information processing features such as learning, interpreted and related. memory, and the ability to generalize. The clonal selection theory is a cornerstone of modern biology in understanding the acquired II. PRINCIPLE COMPONENTS immune system from the perspective of B-lymphocyte cells and This section lists a series of principles (operators or antibody diversity. This work presents a series of computational mechanisms) that are sufficiently low in complexity to adaptive systems inspired by features of the biological immune be analysed independently. It is expected that the system and the clonal selection theory in particular. Starting with mechanisms listed in this section may act as component basic clonal operators as principle components, models are features in larger adaptive models. Operators are presented in increasing complexity from canonical clonal assigned a notation of O# and
    [Show full text]
  • A Network Model for Clonal Differentiation and Immune Memory
    ARTICLE IN PRESS Physica A 355 (2005) 408–426 www.elsevier.com/locate/physa A network model for clonal differentiation and immune memory Alexandre de Castroa,b,Ã aCentro Regional VI, Universidade Estadual do Rio Grande do Sul 90010-030, Porto Alegre, RS, Brazil bInstituto de Fı´sica, Universidade Federal do Rio Grande do Sul 91501-970, Porto Alegre, RS, Brazil Received 21 June 2004 Available online 17 May 2005 Abstract A model of bit-strings, that uses the technique of multi-spin coding, was previously used to study the time evolution of B-cell clone repertoire, in a paper by Lagreca, Almeida and Santos. In this work we extend that simplified model to include independently the role of the populations of antibodies, in the control of the immune response, producing mechanisms of differentiation and regulation in a more complete way. Although the antibodies have the same molecular shape of the B-cells receptors (BCR), they should present a different time evolution and thus should be treated separately. We have also studied a possible model for the network immune memory, suggesting a random memory regeneration, which is self-perpetuating. r 2005 Elsevier B.V. All rights reserved. Keywords: Immune memory; Antibodies evolution; Memory regenerating 1. Introduction In the last decades, due in part to the spread of the world AIDS epidemy, the scientific community started to dedicate special attention to the immunological system, responsible for the defense of the organism against microscopic invaders. ÃCorresponding author. Centro Regional VI, Universidade Estadual do Rio Grande do Sul 90010-030, Porto Alegre, RS, Brazil.
    [Show full text]
  • Interplay of Natural Killer Cells and Their Receptors with the Adaptive Immune Response
    REVIEW BRIDGING INNATE AND ADAPTIVE IMMUNITY Interplay of natural killer cells and their receptors with the adaptive immune response David H Raulet Although natural killer (NK) cells are defined as a component of the innate immune system, they exhibit certain features generally considered characteristic of the adaptive immune system. NK cells also participate directly in adaptive immune responses, mainly by interacting with dendritic cells. Such interactions can positively or negatively regulate dendritic cell activity. Reciprocally, dendritic cells regulate NK cell function. In addition, ‘NK receptors’ are frequently expressed by T cells and can directly regulate the functions of these cells. In these distinct ways, NK cells and their receptors influence the adaptive http://www.nature.com/natureimmunology immune response. Natural killer (NK) cells, a component of the innate immune system, Themes of NK cell recognition mediate cellular cytotoxicity and produce chemokines and inflamma- The recognition strategies used by NK cells are diverse. These include tory cytokines such as interferon-γ (IFN-γ) and tumor necrosis factor recognition of pathogen-encoded molecules; recognition of self pro- (TNF), among other activities1. They are important in attacking teins whose expression is upregulated in transformed or infected cells pathogen-infected cells, especially during the early phases of an infec- (‘induced-self recognition’); and inhibitory recognition of self pro- tion1,2. They are also efficient killers of tumor cells and are believed to be teins that are expressed by normal cells but downregulated by infected involved in tumor surveillance. The long-standing hypothesis that NK or transformed cells (‘missing-self recognition’). What follows are cells exert an immunoregulatory effect is supported by recent evidence examples of each.
    [Show full text]
  • Non-Specific (Innate) Immune System Specific (Adaptive) Immune System
    The immune response PHYSICAL AND Non-specific (innate) CHEMICAL BARRIERS immune system • Physical barriers include the skin and the mucous membranes of the airways, guts, NATURAL KILLER Includes chemical and physical barriers and urinary and reproductive systems. (NK) CELLS (the first line of defence) and responses • Chemical barriers include hydrochloric NK cells kill pathogen- such as inflammation (the second line acid secreted by the stomach lining. infected cells and cancer of defence). Its effects are rapid, short- cells. They also release chemicals called cytokines, lived and non-specific. Found in all Mast cell which alert and attract multicellular organisms. Cells involved in allergic responses, releasing other immune cells. histamine and other inflammatory molecules. Mast cells sit within skin and mucosal tissues. INFLAMMATION IF BREACHED COMPLEMENT Invading microbes trigger A set of around 30 proteins in inflammation. This involves an the blood plasma that can be increase in blood flow to the activated by the presence of affected part of the body, which microbes or antibody–antigen leads to swelling, pain and an complexes. Complement can increase in temperature. Mast destroy pathogens and activate Basophil cells and basophils are involved phagocytic cells. Cells involved in allergic and inflammatory responses. Basophils release histamine in inflammation. like mast cells, but unlike mast cells they circulate in the blood. LEUKOCYTES PHAGOCYTOSIS READ MORE Made in the bone marrow, White blood cells including dendritic cells, macrophages Big Picture is a free post- leukocytes, or white blood cells, are and granulocytes such as eosinophils and neutrophils 16 magazine for teachers an important part of the immune engulf (or phagocytose) microbes or cells that are infected, that explores issues around system.
    [Show full text]
  • Proliferation of Antibody in Clonal Selection Algorithm with Immunological Memory Cell
    SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Proliferation of Antibody in Clonal Selection Algorithm with Immunological Memory Cell Takumi Ichimura Takashi Yamaguchi & Kenneth James Mackin Faculty of Management and Information Systems, Faculty of Informatics, Prefectural University of Hiroshima Tokyo University of Information Sciences 1-1-71, Ujina-Higashi, Minami-ku, 4-1 Onaridai, Wakaba-ku, Chiba, 265-8501 Japan Hiroshima, 734-8559, Japan Email: ftyamagu, [email protected] Email: [email protected] Abstract—The clonal selection principle explains the basic Experimental results for classification of the medical database features of an adaptive immune response to a antigenic stimulus. will be reported in Section 5. In Section 6, we give some It established the idea that only those cells that recognize the discussions to conclude this paper. antigens are selected to proliferate and differentiate. This paper explains a computational implementation of the clonal selection II. THE CLONAL SELECTION THEORY principle that explicitly takes into account the affinity maturation of the immune response. The clonal selection algorithm in this Burnet proposed the clonal selection theory in order to paper finds the antigen by the 3 kinds of combination types of explain the essential features of adaptive immune response Immunological Memory cells and the proliferation of immune [13][14]. The basic idea of this theory interprets the response cells. This paper tried to classify the medical database of Heart Disease database in the the UCI Repository. of lymphocytes in the face of an antigenic stimulus. Any molecule that can be recognized by the adaptive I.
    [Show full text]
  • A Review of the Clonal Selection Theory of Acquired Immunity
    A Review of the Clonal Selection Theory of Acquired Immunity JASON BROWNLEE Technical Report 070223A Complex Intelligent Systems Laboratory, Centre for Information Technology Research, Faculty of Information Communication Technology, Swinburne University of Technology Melbourne, Australia [email protected] Abstract-The clonal selection theory proposed by Nobel Prize II. CLONAL SELECTION THEORY ¢ £ winning immunologist Frank Macfarlane Burnet is a deceptively £ simple algorithmic process that describes the diversity of Don t let conflicting and awkward facts stand in the antibodies and is the foundation for the understanding of the way of an esthetically satisfying theory whose fundamentals are consistent with the world model and ¢ acquired immune system of vertebrates. This paper provides a £ with one another! And be suspicious of facts that seem summary overview of the theory including its inception, main ¤ processes, and some interesting theoretical aspects. in the way of any coherent theory. Lederberg [21], pg 181. Keywords- Clonal Selection Theory, Clonal Selection Principle, Clonal Selection Algorithms, Artificial Immune System A.Theory Development Ada and Nossal [39] provide a detailed summary of I. INTRODUCTION the theories development and related confirmatory Cziko [19] on clonal selection theory: experiments, as does Silverstein [5]. See Forsdyke [9] for an account on the development of the theory [ ¡ ] the immune system does not attempt to predict ¦ the antibody structure that will bind with an antigen, but highlightin¥ g the contributions of Ehrlich. See [20] for ¢ £ Lederberg s comment on clonal selection and elective rather uses a type of shotgun approach that sends in a ¥ diverse army to meet the invaders ¤ theories , and [21] for his account on his part in the history of the developm ent of the theory.
    [Show full text]
  • Antigens & Antibodies II Polyclonal Antibodies Vs Monoclonal Antibodies
    A Brief Review of Antibody Structure A Brief Review of Antibody Structure Primary structure Tertiary structure The basic antibody is a dimer of dimer (2 heavy chain-light chain pairs) composed of repeats of a single structural unit known as the “immunoglobulin Secondary structure domain” Quaternary structure Antigens & Antibodies II Polyclonal antibodies vs Monoclonal antibodies Definitions A comparison of antigen recognition by B and T cells Polyclonal antibodies: antibody preparations from Factors that influence immunogenicity immunized animals. Consist of complex mixtures of different antibodies produced by many different B cell Quantitating the strength of antibody-antigen interactions clones Equilibrium constants equilibrium dialysis Monoclonal Antibody: homogeneous antibody preparations impact of multivalency produced in the laboratory. Consist of a single type of antigen binding site, produced by a single B cell clone Cross-reactivity of antibodies (later we’ll talk about how these are made). Measuring antibody-antigen binding Affinity between two macromolecules can measured using a biosensor Technique: Surface Plasmon Resonance Instrument: Biocore -Resonance units are proportional to the degree of binding of soluble ligand to the immobilized receptor. (or soluble antibody to immobilized antigen, as shown here) - Determining the amount of binding at equilibrium with different known concentrations of receptor (antibody) and ligand (protein antigen) allows you to calculate equilibrium constants (Ka, Kd). -Rate of dissociation and association (koff, kon) can also be calculated. 1 Avidity (strength of binding) is influenced by both Affinity refers to strength of binding of single Affinity (Ka of single binding site) x Valence of epitope to single antigen binding site. interaction (number of interacting binding sites) But antibodies have 2 or more identical binding sites.
    [Show full text]