Malicious Code Execution Detection and Response Immune System Inspired by the Danger Theory

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...

متن کامل

Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...

متن کامل

Malicious Code Execution Detection and Response Immune System

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...

متن کامل

Injury and immune response: applying the danger theory to mosquitoes

The insect immune response can be activated by the recognition of both non-self and molecular by-products of tissue damage. Since pathogens and tissue damage usually arise at the same time during infection, the specific mechanisms of the immune response to microorganisms, and to tissue damage have not been unraveled. Consequently, some aspects of damage caused by microorganisms in vector-borne ...

متن کامل

Stop Malicious Code Execution at Kernel-Level

The problem with blindly running executables is that you are never sure they actually do what you think they are supposed to do (and nothing more...): if viruses spread so much on Microsoft Windows systems, it is mainly because users are frantic to execute whatever they receive, especially if the title is appealing... The LoveLetter virus, with over 2.5 million machines infected, is a famous il...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRN Electronic Journal

سال: 2005

ISSN: 1556-5068

DOI: 10.2139/ssrn.2832006