ARTIFICIAL IMMUNE SYSTEMS APPROACH FOR MALWARE DETECTION: NEURAL NETWORKS APPLYING FOR IMMUNE DETECTORS CONSTRUCTION
DOI:
https://doi.org/10.47839/ijc.7.2.509Keywords:
Artificial immune system, computer security system, malicious code detection, LVQ neural networkAbstract
This paper presents an approach for solving unknown computer viruses detection problem based on the Artificial Immune System (AIS) method, where immune detectors represented neural networks. The AIS is the biologically-inspired technique which have powerful information processing capabilities that makes it attractive for applying in computer security systems. Computer security systems based on AIS principles allow detect unknown malicious code. In this work we are describing model build on the AIS approach in which detectors represent the Learning Vector Quantization (LVQ) neural networks. Basic principles of the biological immune system (BIS) and comparative analysis of unknown computer viruses detection for different antivirus software and our model are presented.References
Traditional antivirus solutions – are they effective against today’s threats? – http://www.viruslist.com, 2008.
Proactive protection: a panacea for Viruses? – http://www.viruslist.com, 2008.
Janeway, C.A. How the Immune System Recognizers Invaders. Scientific American. Vol. 269, no. 3, pp. 72–79, 1993.
Kuby, J. Immunology. In Abadi, M., Ito, T. (eds.): Theoretical Aspects of Computer Software. Lecture Notes in Computer Science, Vol. 1281. Springer-Verlag, Berlin Heidelberg New York, pp. 415–438, 1997.
Jerne, N. K., Clonal Selection in a Lymphocyte Network. Raven Press, pp. 39–48, 1974.
Michalewicz, Z., Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer-Verlag, Berlin Heidelberg New York, 1996.
Forest S., Perelson A., Allen L., Cherukuri R. Self-Nonself Discrimination in a Computer. Proceedings IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, pp. 202–212, 1994.
Balthrop J., Esponda F., Forrest S., Glickman M. Coverage and Generalization in an Artificial Immune System. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO). Morgan Kaufmann Publishers, pp. 3–10, 2002.
S. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, vol. 8, no. 4, pp. 443–473, 2000.
de Castro L. N., Timmis J.I. Artificial Immune Systems: A New Computational Intelligence Approach. Springer-Verlag, 2002.
Kohonen T. Self-organized Formation of Topologically Correct Feature Maps. Biological Cybernetics, no 43, pp. 59–69, 1982.
Hagan M.T., Demuth H.B., Beale M.H. Neural Network Design. 1st edn. PWS Pub. Co., 1995.
Kung S.Y., Mak M.V., Lin S.H. Biometric Authentication: A Machine Learning Approach. Prentice Hall, 2004.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.