Skip to main content

Advertisement

Log in

Developing an algorithm for the application of Bayesian method to software using artificial immune systems

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

This paper develops a new algorithm by applying the Bayesian method to software using artificial immune systems. An artificial immune system is an adaptive computing system that uses models, principles, mechanisms, and functions used to solve problems in theoretical immunology. Its application to various fields of science is studied. The role that artificial immune systems play in software is invaluable. Methods for detecting malware are explored. Some works in the field of artificial immune system are analyzed and issues to be addressed are identified. The Bayesian method accurately calculates the probability of occurrence of any event under certain conditions. Therefore, the Bayesian method is applied to software using artificial immune systems. By applying this method, fast software performance can be achieved. For this, a new algorithm is developed and experiments are conducted. The developed algorithm is one of the new ones. The results of the experiments provide good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Alguliyev RM, Kazimov TH, Mahmudova ShJ, Mahmudova RS (2005) Corporate Information System « Educational Center». Educational Technology. In: The Inter. Conf., ICTE', (ENG and TECH, Canakkale), 8, p. 294

  • Amin F, Fahmi A (2019) Human immunodeficiency virus (HIV) infection model based on triangular neutrosophic cubic hesitant fuzzy number. Int J Biomath. https://doi.org/10.1142/S1793524519500554

    Article  Google Scholar 

  • Biryukov AA (2012) Informat sionnaya bezopasnost’: zashchita i napadeniye. DMK Press, Moskva

    Google Scholar 

  • De Castro LN (2002) Artificial immune systems: a new computational intelligence approach. Springer, Berlin

    MATH  Google Scholar 

  • Daniel K (2005) Judgment under uncertainty: Heuristics and Biases. University Press, Cambridge

    Google Scholar 

  • Dasgupta D (1999) Artificial immune systems and their applications. Springer, Berlin

    Book  Google Scholar 

  • Fanelli Robert L (2008) A hybrid model for immune inspired network intrusion detection artificial immune syst. In: International conference on artificial immune systems (Springer-Verlag, Berlin Heidelberg. 5132: 107. https://doi.org/10.1007/978-3-540-85072-4_10

  • Gavrilyuk SV, Onyky BN, Stankevichus AA (2010) Primeneniye iskusstvennykh immunnykh sistem dlya zashchity sred raspredelennykh vychisleniy ot vredonosnogo programmnogo obespecheniya Bezopasnost. Informatsionnyye Tekhnologii 17(3):32

    Google Scholar 

  • Kephart J (1994) A biologically inspired immune system for computers . In: Fourth Int. Workshop on the Synthesis and Simulation of Living Systems. MA: MIT Press, Cambridge, p. 130

  • Kris K (2006) Kompyuter virus iznutri i snaruzhi. SPB: Piter

  • Laith A and Ali D (2021) Advances in Sine Cosine Algorithm: A comprehensive survey. Artificial Intelligence Review. 54: 2567–2608. https://link.springer.com/article/10.1007%2Fs10462-020-09909-3

  • Laith A, Ali D, Seyedali M, Mohamed AE, Gandomi AH (2021) The arithmetic optimization algorithm. Comput Methods Appl Mech Eng 376:113. https://doi.org/10.1016/j.cma.2020.113609

    Article  MathSciNet  MATH  Google Scholar 

  • Ligeiro R (2014) Monitoring applications: an immune inspired algorithm for software-fault detection. Appl Soft Comput 24:1095. https://doi.org/10.1016/j.asoc.2014.08.021

    Article  Google Scholar 

  • Louati S, Darmoul S, Elkosantini S, Ben Said L (2018) An artificial immune network to control interrupted flow at a signalized intersection an arti. Inf Sci 433:70. https://doi.org/10.1016/j.ins.2017.12.033

    Article  MATH  Google Scholar 

  • Rathore H, Guizani M, Mohamed A (2018) Mathematical evaluation of human immune systems for securing software defined networkswireless net. and Mob. Comm. In: 6TH In. Conf. (IEEE, Morocco), p. 187. https://doi.org/10.1109/WINCOM.2018.8629728

  • Sniecinski I, Seghatchian J (2018) Artificial intelligence: a joint narrative on potential use in pediatric stem and immune cell therapies and regenerative medicine. Trans Aphaeresis Sci 57(3):422. https://doi.org/10.1016/j.transci.2018.05.004

    Article  Google Scholar 

  • Tokarev VL, Sychugov AA (2017) Obnaruzheniye vredonosnogo programmnogo obespecheniya s ispol'zovaniyem immunnykh detektorov. Izvestiya TulGU 10:216–230

  • Venkatesan A (2008) Code obfuscation and virus detection master's projects. San Jose State University, IZD

  • Yang Bo (2019) Mathematical Evaluation Of Human Immune Systems For Securing Software Defined Networks Safety Science. In: 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).118:205. https://doi.org/10.1109/WINCOM.2018.8629728

  • Ye GV (2005) Teoriya veroyatnostey i matematicheskaya statistika. Vyssheye obrazovaniye, Moskva

  • Yevdokimov KN (2012) K voprosu o sovershenstvovanii ugolovnoy otvetstvennosti za sozdaniye, ispol'zovaniye i rasprostraneniye vredonosnykh programm dlya evm. Izvestiya IGEA 3(83):136–139

Download references

Acknowledgements

The author thanks the editors and anonymous reviewers for their helpful comments and suggestions that have led to this improved version of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafagat Mahmudova.

Ethics declarations

Conflict of interest

The author declares no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the author.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Communicated by Harini Balasubramanian.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahmudova, S. Developing an algorithm for the application of Bayesian method to software using artificial immune systems. Soft Comput 25, 11837–11843 (2021). https://doi.org/10.1007/s00500-021-05972-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05972-2

Keyword

Navigation