IJEM Vol. 1, No. 5, 5 Oct. 2011
Cover page and Table of Contents: PDF (size: 143KB)
Full Text (PDF, 143KB), PP.52-58
Views: 0 Downloads: 0
Artificial Immunity, Virus Detection System, Artificial Intelligence, Antivirus
Artificial immunity, as a new technology, has been applied widely in virus detection system for its advantages. This paper emphasizes on these works as follows. Firstly, we analyze the disadvantages of traditional virus detection methods and new functions of artificial immune technology, and then review some typical algorithms of the existing virus detection system based on artificial immunity. Finally, a universal evaluating scheme is proposed. The purpose for this paper is to study the existent artificial immune methods and promote the new schemes emergence for virus detection system effectively.
DENG Daping, DENG Xiaohong,"Study on the Application of Artificial Immunity in Virus Detection System", IJEM, vol.1, no.5, pp.52-58, 2011. DOI: 10.5815/ijem.2011.05.07
[1]Ruan, G.C., Tan, Y.. “A Three-layer Back-propagation Neural Network for Spam Detection using Artificial Immune Concentration”. Software Computing, vol.14, pp.139–150, 2010.
[2]Saman, M. A., Omar, Z.. “Devising a Biological Model to Detect Polymorphic Computer Virus—Artificial immune system (AIM) Review”. 2009 International Conference on Computer Technology and Development, Kota Kinabalu: IEEE Computer Society, November 13-15, 2009.
[3]Wang, W., Zhang P. T., Tan, Y., He, X. G.. “A Hierarchical Artificial Immune Model for Virus Detection”. 2009 International Conference on Computational Intelligence and Security, Beijing: IEEE Computer Society, December 11-15, 2009.
[4]Chao, R., Tan, Y.. “A Virus Detection System Based on Artificial Immune System”. 2009 International Conference on Computational Intelligence and Security, Beijing: IEEE Computer Society, December 11-15, 2009.
[5]Cui, Z. L., Lu, X., Wang, J.. “Adaptive Intrusion Tolerance Strategy of the System Based on Artificial Immune”.2009 International Conference on Computational Intelligence and Software Engineering, Wuhan: IEEE Computer Society, December 11-13, 2009.
[6]Han, C.W., Shou, H.S.. “Neural Networks-based Detection of Stepping-stone Intrusion”.Expert Systems with Applications, vol.37, pp.1431-1437, 2010.
[7]Horng, S.J., Fan, P.Z., Chou, Y.P., Chang, Y.C., Pan, Y.. “A Feasible Intrusion Detector for Recognizing IIS Attacks based on Neural Networks”. Computers & Security, vol.27, pp.84-100, 2008.
[8]Wu, C.H.. “Behavior-based Spam Detection using a Hybrid Method of Rule-based Techniques and Neural Networks”. Expert Systems with Applications, vol.36, pp.4321-4330,2009.
[9]Wang, Y., Gu, D.W., Li, W., Li, H.J., Li, J.. “Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network”. LNCS, vol.5551, pp.60-67, 2009.
[10]Wang, Y., Gu, D.W., Wen, M., Li, H., Xu J.P.. “Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network”. LNCS, vol. 6064, pp. 556-565, 2010.
[11]Han, C.W., Shou, H.S. “Neural Networks-based Detection of Stepping-stone Intrusion”. Expert Systems with Applications vol. 37, pp. 1431–1437, 2010.
[12]Zhang, Y., Wu, L.H., Xia F., Liu, X.W.. “Immunity-based Model for Malicious Code Detection”. LNCS, vol. 6215, pp.399-406, 2010.
[13]Ou, C. M., Ou, C.R.. “Abstraction from Dendritic Cell Algorithm with Danger Theory”. LNCS, vol. 6104, pp.670-678, 2010.
[14]Wang W., Zhang P.T., Tan Y.. “An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization”. LNCS, vol.6145, pp.347-354, 2010.
[15]Yu, X. D.. “Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel”. 2009 International Conference on Environmental Science and Information Application Technology, Wuhan: IEEE Computer Society, July 4-5, 2009.
[16]Wang, X.B., Yang G.Y., Li Y.C., Liu Dan.. “Review on the application of Artificial Intelligence in Antivirus Detection System”. 2008 IEEE Conference on Cybernetics and Intelligent Systems, London: IEEE Computer Society, September 21-24, 2008.