Immune system for virus detection and elimination

作者: Rune Schmidt Jensen

DOI:

关键词: Virus detectionHamming distanceJavaCode (cryptography)Matching (graph theory)Biological immune systemComputer scienceHidden Markov modelImmune systemSpeech recognition

摘要: In this thesis we consider the aspects of designing a computer immune system for virus detection and elimination using components techniques found in biological system. Already published proposals constructing systems are described analysed. Based on these analyses general introduction to modelling design detection. use three different kinds loose matching: Hamming Distance, R-Contiguous Symbols, Hidden Markov Models (HMMs). A complete depth to theory HMMs will be given algorithms used connexion with explained. framework representing together implemented Java as part CIS package which is thought being preliminary version system. Experiments infected programs presented. trained static code from non-infected traces calls generated by executions programs. The ability detect infections tested. It concluded that successfully can

参考文章(6)
Anders Krogh, Chapter 4 - An introduction to hidden Markov models for biological sequences New Comprehensive Biochemistry. ,vol. 32, pp. 45- 63 ,(1998) , 10.1016/S0167-7306(08)60461-5
L. Rabiner, B. Juang, An introduction to hidden Markov models IEEE ASSP Magazine. ,vol. 3, pp. 4- 16 ,(1986) , 10.1109/MASSP.1986.1165342
L.R. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition Proceedings of the IEEE. ,vol. 77, pp. 267- 296 ,(1989) , 10.1109/5.18626
S. Forrest, A.S. Perelson, L. Allen, R. Cherukuri, Self-nonself discrimination in a computer ieee symposium on security and privacy. pp. 202- 212 ,(1994) , 10.1109/RISP.1994.296580
Anil Somayaji, Steven Hofmeyr, Stephanie Forrest, Principles of a computer immune system new security paradigms workshop. pp. 75- 82 ,(1998) , 10.1145/283699.283742
Steven A. Hofmeyr, Stephanie Forrest, Immunity by design: an artificial immune system genetic and evolutionary computation conference. pp. 1289- 1296 ,(1999)