Skip to main content

2012 | OriginalPaper | Buchkapitel

55. Malware Detection Techniques Using Artificial Immune System

verfasst von : Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof

Erschienen in: Proceedings of the International Conference on IT Convergence and Security 2011

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Using artificial immune system techniques for malware detection has two major benefits. First, increasing the ability to come over some of the traditional detector’s drawbacks, like dealing with the new and polymorphic malware and the increased number of false alarms caused by wrong decision. Second take advantages of the capabilities to learn, adapt, self-tolerance and memories actions, which make it a good example that we can take for solving some major problems in many fields, including the problem of malware detection in computer security which suffering from the rapid increasing in the malware and the problem of false positive alarms. In this paper, we try to highlight the recent techniques applied in malware detection using the artificial immune system from two points of view: self–nonself theory, danger theory.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Christodorescu M, Jha S, Seshia SA, Song D, Bryant RE (2005) Semantics-aware malware detection. in Security and Privacy, 2005 IEEE Symposium on. 2005 Christodorescu M, Jha S, Seshia SA, Song D, Bryant RE (2005) Semantics-aware malware detection. in Security and Privacy, 2005 IEEE Symposium on. 2005
2.
Zurück zum Zitat Castro LND, Von Zuben FJ (1999) Artificial immune systems:Part I–Basic theory and applications” Castro LND, Von Zuben FJ (1999) Artificial immune systems:Part I–Basic theory and applications”
3.
Zurück zum Zitat Timmis J, Knight T, Castro LND, Hart E (2004) An overview of Artificial immune systems Timmis J, Knight T, Castro LND, Hart E (2004) An overview of Artificial immune systems
4.
Zurück zum Zitat Andrews L (2008) Immunity: St. Martin’s Minotaur Andrews L (2008) Immunity: St. Martin’s Minotaur
5.
Zurück zum Zitat Kuby J (1994) Immunology. Vol. 2nd Ed Kuby J (1994) Immunology. Vol. 2nd Ed
6.
Zurück zum Zitat Vinod P, Laxmi V, Gaur MS (2009) Survey on malware detection methods. Malaviya National Institute of Technology Vinod P, Laxmi V, Gaur MS (2009) Survey on malware detection methods. Malaviya National Institute of Technology
7.
Zurück zum Zitat Idika N, Mathur AP (2007) A survey of malware detection techniques. Department of Computer Science,Purdue University, West Lafayette, IN 47907 Idika N, Mathur AP (2007) A survey of malware detection techniques. Department of Computer Science,Purdue University, West Lafayette, IN 47907
8.
Zurück zum Zitat Vinod P, Laxmi V, Gaur MS (2009) Survey on malware detection methods Vinod P, Laxmi V, Gaur MS (2009) Survey on malware detection methods
9.
Zurück zum Zitat Weaver N, Paxson V, Staniford S, Cunningham R (2003) A taxonomy of computer worms, in Proceedings of the 2003 ACM workshop on Rapid malcode. ACM: Washington. p 11–18 Weaver N, Paxson V, Staniford S, Cunningham R (2003) A taxonomy of computer worms, in Proceedings of the 2003 ACM workshop on Rapid malcode. ACM: Washington. p 11–18
10.
Zurück zum Zitat Yin H, Song D, Egele M, Kruegel C, Kirda E (2007) Panorama: capturing system-wide information flow for malware detection and analysis, in Proceedings of the 14th ACM conference on Computer and communications security. ACM: Alexandria. p 116–127 Yin H, Song D, Egele M, Kruegel C, Kirda E (2007) Panorama: capturing system-wide information flow for malware detection and analysis, in Proceedings of the 14th ACM conference on Computer and communications security. ACM: Alexandria. p 116–127
11.
Zurück zum Zitat Castro LND, Timmis J (2002) Artificial immune systems: a new computational intelligence approach: Springer Castro LND, Timmis J (2002) Artificial immune systems: a new computational intelligence approach: Springer
12.
Zurück zum Zitat Somayaji A, Hofmeyr S, Forrest S (1997) Principles of a computer immune system. In: Proceedings of the 1997 workshop on New security paradigms. ACM: Langdale, Cumbria. p 75–82 Somayaji A, Hofmeyr S, Forrest S (1997) Principles of a computer immune system. In: Proceedings of the 1997 workshop on New security paradigms. ACM: Langdale, Cumbria. p 75–82
13.
Zurück zum Zitat Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection–a review. In: Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) Artificial immune systems. Springer, Berlin, pp 316–329CrossRef Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection–a review. In: Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) Artificial immune systems. Springer, Berlin, pp 316–329CrossRef
14.
Zurück zum Zitat Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Phys D: Nonlinear Phenom 22(1–3):187–204MathSciNetCrossRef Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Phys D: Nonlinear Phenom 22(1–3):187–204MathSciNetCrossRef
15.
Zurück zum Zitat Jerne NK (1974) Towards a network theory of the immune system. Ann d’immunologie 125(1-2):373–389 Jerne NK (1974) Towards a network theory of the immune system. Ann d’immunologie 125(1-2):373–389
16.
17.
Zurück zum Zitat Bersini H, Varela F (1991) Hints for adaptive problem solving gleaned from immune networks. In: Schwefel H-P, Männer R (eds) Parallel problem solving from nature. Springer, Berlin, pp 343–354CrossRef Bersini H, Varela F (1991) Hints for adaptive problem solving gleaned from immune networks. In: Schwefel H-P, Männer R (eds) Parallel problem solving from nature. Springer, Berlin, pp 343–354CrossRef
18.
Zurück zum Zitat Janeway CA (1989) Approaching the asymptote? Evolution and revolution in immunology. Cold Spring Harbor symposia on quantitative biology, 54 Pt 1: pp 1–13 Janeway CA (1989) Approaching the asymptote? Evolution and revolution in immunology. Cold Spring Harbor symposia on quantitative biology, 54 Pt 1: pp 1–13
19.
Zurück zum Zitat Greensmith J, Whitbrook A, Aickelin U (2010) Artificial immune systems. In: Gendreau M, Potvin J-Y (eds) Handbook of metaheuristics. Springer, US, pp 421–448CrossRef Greensmith J, Whitbrook A, Aickelin U (2010) Artificial immune systems. In: Gendreau M, Potvin J-Y (eds) Handbook of metaheuristics. Springer, US, pp 421–448CrossRef
20.
Zurück zum Zitat Burnet S (1960) The clonal selection theory of acquired immunity Burnet S (1960) The clonal selection theory of acquired immunity
21.
Zurück zum Zitat Matzinger P (2001) The Danger Model in Its Historical Context. Scand J Immunol, Blackwell Science Ltd, 54: 4–9 Matzinger P (2001) The Danger Model in Its Historical Context. Scand J Immunol, Blackwell Science Ltd, 54: 4–9
22.
Zurück zum Zitat Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. International Conference on Artificial immune systems, Canterbury Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. International Conference on Artificial immune systems, Canterbury
23.
Zurück zum Zitat Nossal GJV (1994) Negative selection of lymphocytes. (0092-8674) Nossal GJV (1994) Negative selection of lymphocytes. (0092-8674)
24.
Zurück zum Zitat Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. in Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on. 1994 Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-nonself discrimination in a computer. in Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on. 1994
25.
Zurück zum Zitat Dasgupta D, Attoh-Okine N (1997) Immunity-based systems: A survey Dasgupta D, Attoh-Okine N (1997) Immunity-based systems: A survey
26.
Zurück zum Zitat Hofmeyr SA, Stephanie F, Anil S (1998) Intrusion detection using sequences of system calls. J Comput Secur 6(3):151–180 Hofmeyr SA, Stephanie F, Anil S (1998) Intrusion detection using sequences of system calls. J Comput Secur 6(3):151–180
27.
Zurück zum Zitat Hofmeyr S, Forrest S (1999) Immunity by design: An artificial immune system. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO Hofmeyr S, Forrest S (1999) Immunity by design: An artificial immune system. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO
28.
Zurück zum Zitat D’Haeseleer P, Forrest S, Helman P (1996) An immunological approach to change detection: algorithms, analysis and implications. In Security and Privacy, 1996. Proceedings, IEEE Symposium on. 1996 D’Haeseleer P, Forrest S, Helman P (1996) An immunological approach to change detection: algorithms, analysis and implications. In Security and Privacy, 1996. Proceedings, IEEE Symposium on. 1996
29.
Zurück zum Zitat Brownlee J (2007) Clonal selection algorithms. Complex Intelligent Systems Laboratory, Swinburne University of Technology, Australia Brownlee J (2007) Clonal selection algorithms. Complex Intelligent Systems Laboratory, Swinburne University of Technology, Australia
30.
Zurück zum Zitat Castro LNd, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. Evolutionary Computation, IEEE Transactions 6(3): 239–251 Castro LNd, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. Evolutionary Computation, IEEE Transactions 6(3): 239–251
31.
Zurück zum Zitat Castro LND, Von Zuben FJ (2002) The clonal selection algorithm with engineering applications. In Workshop Proceedings of GECCO’00, pp 36–37, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, July 2000 Castro LND, Von Zuben FJ (2002) The clonal selection algorithm with engineering applications. In Workshop Proceedings of GECCO’00, pp 36–37, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, July 2000
32.
Zurück zum Zitat Timmis J, Hone A, Stibor T, Clark E (2008) Theoretical advances in artificial immune systems. Theor Comput Sci 403(1):11–32MathSciNetCrossRefMATH Timmis J, Hone A, Stibor T, Clark E (2008) Theoretical advances in artificial immune systems. Theor Comput Sci 403(1):11–32MathSciNetCrossRefMATH
33.
Zurück zum Zitat Greensmith J, Aickelin U (2009) Artificial dendritic cells: multi-faceted perspectives. In: Bargiela A, Pedrycz W (eds) Human-centric information processing through granular modelling. Springer, Berlin, pp 375–395CrossRef Greensmith J, Aickelin U (2009) Artificial dendritic cells: multi-faceted perspectives. In: Bargiela A, Pedrycz W (eds) Human-centric information processing through granular modelling. Springer, Berlin, pp 375–395CrossRef
34.
Zurück zum Zitat Matzinger P (1994) Tolerance, danger, and the extended family. Annu Rev Immunol 12:991–1045CrossRef Matzinger P (1994) Tolerance, danger, and the extended family. Annu Rev Immunol 12:991–1045CrossRef
35.
Zurück zum Zitat Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305CrossRef Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305CrossRef
36.
Zurück zum Zitat Holland JH, Holyoak KJ, Nisbett RE, Thagard P (1986) Induction processes of inference, learning, and discovery Vol 1: The MIT Press Holland JH, Holyoak KJ, Nisbett RE, Thagard P (1986) Induction processes of inference, learning, and discovery Vol 1: The MIT Press
37.
Zurück zum Zitat Forrest S, Perelson AS (1992) Computation and the immune system. SIGBIO Newsl 12(2):52–57CrossRef Forrest S, Perelson AS (1992) Computation and the immune system. SIGBIO Newsl 12(2):52–57CrossRef
38.
Zurück zum Zitat Kephart JO (1994) A biologically inspired immune system for computers, In Artificial Life IV Kephart JO (1994) A biologically inspired immune system for computers, In Artificial Life IV
39.
Zurück zum Zitat Dasgupta D (1999) Immunity-based intrusion detection system: a general framework. in Proceedings 22nd National Information Systems Security Conference. Place of Publication: Gaithersburg, MD, USA; Arlington, VA, USA. Country of Publication: USA.: NIST Armed Forces Communication and Electronics Association Armed Forces Communication and Electronics Association Dasgupta D (1999) Immunity-based intrusion detection system: a general framework. in Proceedings 22nd National Information Systems Security Conference. Place of Publication: Gaithersburg, MD, USA; Arlington, VA, USA. Country of Publication: USA.: NIST Armed Forces Communication and Electronics Association Armed Forces Communication and Electronics Association
40.
Zurück zum Zitat Li T, Liu X, Li H (2005) An immune-based model for computer virus detection. In: Desmedt Y, Wang H, Mu Y, Li Y (eds) Cryptology and network security. Springer, Berlin, pp 59–71CrossRef Li T, Liu X, Li H (2005) An immune-based model for computer virus detection. In: Desmedt Y, Wang H, Mu Y, Li Y (eds) Cryptology and network security. Springer, Berlin, pp 59–71CrossRef
41.
Zurück zum Zitat Hofmeyr SA, Forrest S (2000) Architecture for an Artificial Immune System. Evol Comput 8(4):443–473CrossRef Hofmeyr SA, Forrest S (2000) Architecture for an Artificial Immune System. Evol Comput 8(4):443–473CrossRef
42.
Zurück zum Zitat Twycross J, Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Artificial immune systems. Springer, Berlin, pp 112–125CrossRef Twycross J, Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Artificial immune systems. Springer, Berlin, pp 112–125CrossRef
43.
Zurück zum Zitat Edge KS, Lamont GB, Raines RA (2006) A retrovirus inspired algorithm for virus detection and optimization, In Proceedings of the 8th annual conference on Genetic and evolutionary computation. ACM: Seattle. p 103–110 Edge KS, Lamont GB, Raines RA (2006) A retrovirus inspired algorithm for virus detection and optimization, In Proceedings of the 8th annual conference on Genetic and evolutionary computation. ACM: Seattle. p 103–110
44.
Zurück zum Zitat Rui C, Ying T (2009) A Virus Detection System Based on Artificial Immune System. in Computational Intelligence and Security. CIS ‘09. International Conference on. 2009 Rui C, Ying T (2009) A Virus Detection System Based on Artificial Immune System. in Computational Intelligence and Security. CIS ‘09. International Conference on. 2009
45.
Zurück zum Zitat Zhang P, Wang W, Tan Y (2010) A malware detection model based on a negative selection algorithm with penalty factor. Sci China Inf Sci 53(12):2461–2471CrossRef Zhang P, Wang W, Tan Y (2010) A malware detection model based on a negative selection algorithm with penalty factor. Sci China Inf Sci 53(12):2461–2471CrossRef
46.
Zurück zum Zitat Zhang Y, Wu L, Xia F, Liu X (2010) Immunity-based model for malicious code detection. In: Huang D-S, Zhao Z, Bevilacqua V, Figueroa J (eds) Advanced intelligent computing theories and applications. Springer, Berlin, pp 399–406CrossRef Zhang Y, Wu L, Xia F, Liu X (2010) Immunity-based model for malicious code detection. In: Huang D-S, Zhao Z, Bevilacqua V, Figueroa J (eds) Advanced intelligent computing theories and applications. Springer, Berlin, pp 399–406CrossRef
47.
Zurück zum Zitat Golovko V, Bezobrazov S, Kachurka P, Vaitsekhovich L (2010) Neural network and artificial immune systems for malware and network intrusion detection. In: Koronacki J, Ras Z, Wierzchon S, Kacprzyk J (eds) Advances in machine learning II. Springer, Berlin, pp 485–513CrossRef Golovko V, Bezobrazov S, Kachurka P, Vaitsekhovich L (2010) Neural network and artificial immune systems for malware and network intrusion detection. In: Koronacki J, Ras Z, Wierzchon S, Kacprzyk J (eds) Advances in machine learning II. Springer, Berlin, pp 485–513CrossRef
Metadaten
Titel
Malware Detection Techniques Using Artificial Immune System
verfasst von
Mohamed Ahmed Mohamed Ali
Mohd Aizaini Maarof
Copyright-Jahr
2012
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-2911-7_55

Neuer Inhalt