Abstract
Artificial immune system(AIS) is an efficient solution for network security. In this paper, an artificial immune system approach for malware detection is proposed, which is referred to AISMD. In AISMD, the method to build the profile of benign executables in computer systems is given. Based on the built model of benign executable, the detectors are generated to detect malware. Experimental results show that AISMD is an efficient method to build the profile of benign executable and extract the characteristics of the executable, and has better detecting ability than that of the previous techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
McAfee Threats Report: First Quarter (2013), http://www.mcafee.com/au/resources/reports/rp-quarterly-threat-q1-2013.pdf
Fan, W.Q., Lei, X., An, J.: Obfuscated Malicious Code Detection with Path Condition Analysis. Journal of Networks 9(5), 1208–1214 (2014)
Iker, B., Urko, Z., Simin, N.T.: Crowdroid: Behavior-Based Malware Detection System for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26 (2011)
Schultz, M., Eskin, E., Zadok, E., Stolf, S.: Data Mining Methods for Detection of New Malicious Executables. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 38–49. IEEE Computer Society (2001)
Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (1994)
Gonzalez, F.A., Dasgupta, D.: Anomaly Detection Using Real-Valued Negative Selection. Genetic Programming and Evolvable Machines 4, 383–403 (2003)
Ji, Z., Dasgupta, D.: Real-valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004)
Zhang, P.T., Wang, W., Tan, Y.: A malware Detection Model Based on A Negative Selection Algorithm with Penalty Factor. Science China Information Sciences 53(12), 2461–2471 (2010)
Peng, H., Wang, J.: Research of Malicious Executables Detection Method Based on Support Vector Machine. Acta Electronica Sinica 33(2), 276–278 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zeng, J., Tang, W. (2014). An Artificial Immune System Approach for Malware Detection. In: Pan, L., Păun, G., Pérez-Jiménez, M.J., Song, T. (eds) Bio-Inspired Computing - Theories and Applications. Communications in Computer and Information Science, vol 472. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45049-9_91
Download citation
DOI: https://doi.org/10.1007/978-3-662-45049-9_91
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45048-2
Online ISBN: 978-3-662-45049-9
eBook Packages: Computer ScienceComputer Science (R0)