Implementation of a Security Model for Malware Based on Artificial Immune System

نویسندگان

  • Santiago Yip Ortuño
  • José A. Hernández-Aguilar
  • Carlos Alberto Ochoa Ortíz Zezzatti
چکیده

This research discusses intrusion detection systems based on computer networks and a model for the detection of malware using artificial immune system (AIS). The SIA has three main theories: the clonal selection, negative selection and network theory. This work used the ClonalG algorithm developed by Castro & Timmis (2002) [5] and implemented in Weka 3.6.4 for the intrusions detection in the KDD 1999 database. Preliminary results indicate good results, since was obtained 77.92% accuracy in the classification of threats using CLONALG algorithm, and 92.69% of accuracy by using CLONALG and feature selection of a total of 494,021 processed registers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory

Artificial immune system (AIS) is a computational system inspired by the principles and processes of the Biological immune system which has the capabilities to learn, adapt, self tolerance and memories actions, which make it a good example that we can take for solving some major problems in many fields, including the problem of malware detection in the field of computer security. The main idea ...

متن کامل

An artificial immunity approach to malware detection in a mobile platform

Inspired by the human immune system, we explore the development of a new Multiple-Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on the information flows in Android apps. mAISs differ from conventional AISs in that multiple-detector sets are evolved concurrently via negative selection. Typically, the first detector set is composed of detectors that match ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Research in Computing Science

دوره 122  شماره 

صفحات  -

تاریخ انتشار 2016