You are not logged in.
Openly accessible

Malicious code detection architecture inspired by human immune system

Marhusin, Mohd Fadzli, Cornforth, David and Larkin, Henry 2008, Malicious code detection architecture inspired by human immune system, in ACIS 2008 : International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing : in conjunction with Second International Worshop on Advanced Internet Technology and Aplications : proceedings : August 6-8, 2008, Phuket, Thailand, [The Conference], Phuket, Thailand, pp. 312-317, doi: 10.1109/SNPD.2008.160.

Attached Files
Name Description MIMEType Size Downloads
larkin-maliciouscode-2008.pdf Published version application/pdf 493.51KB 116

Title Malicious code detection architecture inspired by human immune system
Author(s) Marhusin, Mohd Fadzli
Cornforth, David
Larkin, HenryORCID iD for Larkin, Henry orcid.org/0000-0001-5867-1542
Conference name Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Conference (9th : 2008 : Phuket, Thailand)
Conference location Phuket, Thailand
Conference dates 6-8 Aug. 2008
Title of proceedings ACIS 2008 : International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing : in conjunction with Second International Worshop on Advanced Internet Technology and Aplications : proceedings : August 6-8, 2008, Phuket, Thailand
Editor(s) [Unknown]
Publication date 2008
Conference series Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Conference
Start page 312
End page 317
Total pages 6
Publisher [The Conference]
Place of publication Phuket, Thailand
Keyword(s) software engineering
artificial intelligence
networking
malicious code
human immune system
Summary Malicious code is a threat to computer systems globally. In this paper, we outline the evolution of malicious code attacks. The threat is evolving, leaving challenges for attackers to improve attack techniques and for researchers and security specialists to improve detection accuracy. We present a novel architecture for an effective defense against malicious code attack, inspired by the human immune system. We introduce two phases of program execution: Adolescent and Mature Phase. The first phase uses a malware profile matching mechanism, whereas the second phase uses a program profile matching mechanism. Both mechanisms are analogous to the innate immune system
ISBN 9780769532639
Language eng
DOI 10.1109/SNPD.2008.160
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1.1 Full written paper - refereed
Copyright notice ©2008, ACIS
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30063698

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 40 Abstract Views, 116 File Downloads  -  Detailed Statistics
Created: Thu, 29 May 2014, 14:49:08 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.