Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory

03/22/2010
by   Jungwon Kim, et al.
0

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/14/2010

Dendritic Cells for Anomaly Detection

Artificial immune systems, more specifically the negative selection algo...
research
02/01/2010

Dendritic Cells for SYN Scan Detection

Artificial immune systems have previously been applied to the problem of...
research
09/24/2021

SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls

Following the current big data trend, the scale of real-time system call...
research
01/13/2010

DCA for Bot Detection

Ensuring the security of computers is a non-trivial task, with many tech...
research
04/15/2019

Comparison of System Call Representations for Intrusion Detection

Over the years, artificial neural networks have been applied successfull...
research
12/31/2013

A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents

We propose an artificial immune model for intrusion detection in distrib...

Please sign up or login with your details

Forgot password? Click here to reset