A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory

  • Mohamed Ahmed Mohamed Ali
  • Mohd Aizaini Maarof
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)


Artificial immune system (AIS) is a computational system inspired by the principles and processes of the Biological immune system which has the capabilities to learn, adapt, self tolerance and memories actions, which make it a good example that we can take for solving some major problems in many fields, including the problem of malware detection in the field of computer security. The main idea is to detect any type of files that trying to harm the computer system by infecting some executable software when these files running, spread it to other files or computers. In this paper, we proposed a framework to detect malware using the innate immune system combined with danger theory to eliminate tow major drawbacks of current malware detection methods; detection accuracy and high false positive alarms.


Innate immune system Danger theory Malware detection 



This work and research is done by support of Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, Faculty of Mathematical Sciences, University of Khartoum, Sudan.


  1. 1.
    Christodorescu M, Jha S, Seshia SA, Song D, Bryant RE (2005) Semantics-aware malware detection. In: IEEE symposium on security and privacy, 2005Google Scholar
  2. 2.
    Castro LND, Von Zuben FJ (1999) Artificial immune systems: part I—basic theory and applications. Technical Report, RT–DCA 01/99, Dec 1999Google Scholar
  3. 3.
    Timmis J, Knight T, Castro LND, Hart E (2004) An overview of artificial immune systems. 2004Google Scholar
  4. 4.
    Andrews L (2008) Immunity, St. Martin’s Minotaur 2008Google Scholar
  5. 5.
    Kuby J (1994) Immunology. vol 2nd edn. 1994Google Scholar
  6. 6.
    Parkin J, Cohen B (2001) An overview of the immune system. The Lancet 357(9270):1777–1789CrossRefGoogle Scholar
  7. 7.
    Medzhitov R (2001) Toll-like receptors and innate immunity. Nat Rev Immunol 1(2):135–145CrossRefGoogle Scholar
  8. 8.
    Matzinger P (1994) Tolerance, danger, and the extended family. Annu Rev Immunol 12:991–1045CrossRefGoogle Scholar
  9. 9.
    Ali MAM, Maarof MA (2012) Malware detection techniques using artificial immune system. In: Kim KJ, Ahn SJ, (eds) Proceedings of the international conference on IT convergence and security 2011, Springer, Netherlands, pp 575–587Google Scholar
  10. 10.
    Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305CrossRefGoogle Scholar
  11. 11.
    Janeway CA (1989) Approaching the asymptote? Evolution and revolution in immunology. Cold spring harbor symposia on quantitative biology, vol 54 Pt 1, pp 1–13Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Mohamed Ahmed Mohamed Ali
    • 1
  • Mohd Aizaini Maarof
    • 2
  1. 1.Faculty of Mathematical SciencesUniversity of KhartoumKhartoumSudan
  2. 2.Faculty of Computer Science and Information SystemsUniversiti Teknology MalaysiaJohorMalaysia

Personalised recommendations