Malicious Code Execution Detection and Response Immune System Inspired by the Danger Theory
نویسندگان
چکیده
منابع مشابه
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
متن کاملMalicious Code Execution Detection and Response Immune System inpired by the Danger Theory
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
متن کاملMalicious Code Execution Detection and Response Immune System
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
متن کاملInjury and immune response: applying the danger theory to mosquitoes
The insect immune response can be activated by the recognition of both non-self and molecular by-products of tissue damage. Since pathogens and tissue damage usually arise at the same time during infection, the specific mechanisms of the immune response to microorganisms, and to tissue damage have not been unraveled. Consequently, some aspects of damage caused by microorganisms in vector-borne ...
متن کاملStop Malicious Code Execution at Kernel-Level
The problem with blindly running executables is that you are never sure they actually do what you think they are supposed to do (and nothing more...): if viruses spread so much on Microsoft Windows systems, it is mainly because users are frantic to execute whatever they receive, especially if the title is appealing... The LoveLetter virus, with over 2.5 million machines infected, is a famous il...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2005
ISSN: 1556-5068
DOI: 10.2139/ssrn.2832006