Anatomy of a Commercial-Grade Immune System

作者: David M. Chess , John F. Morar , William C. Arnold , Steve R. White , Morton Swimmer

DOI:

关键词:

摘要: We have built the first commercial-grade immune system that can find, analyze and cure previously unknown viruses faster than themselves spread. The solves several important problems. A single console allows a customer administrator to decide whether are submitted for analysis automatically, or explicit approval is required, permits new virus definitions be distributed automatically in response virus, held administrator's approval. novel active network architecture handle vast number of submissions quickly, so floods due an epidemic fast-spreading submission many uninfected files. center most with greater speed precision human analysts can. runs virtual environment, process safe lets our programs behavior real time. Viruses replicated operating application environments, including various national languages. Upconversion downconversion macro handled automatically. Both scaleable, easily accommodate ever-increasing loads. End-to-end security samples ensures authentication definitions. During presentation, we will give live demonstration pilot run customers, review experience system.

参考文章(7)
Eugene H. Spafford, The internet worm: crisis and aftermath Communications of The ACM. ,(1989)
Jeffrey Kephart, Gregory Sorkin, Morton Swimmer, Steve White, Blueprint for a Computer Immune System Proceedings of the 1997 International Virus Bulletin Conference, San Francisco, California, October, 1997. pp. 242- 261 ,(1999) , 10.1007/978-3-642-59901-9_13
David M. Chess, Gregory B. Sorkin, Jeffrey O. Kephart, Automatic analysis of a computer virus structure and means of attachment to its hosts ,(1994)
G.J. Tesauro, J.O. Kephart, G.B. Sorkin, Neural networks for computer virus recognition IEEE Intelligent Systems. ,vol. 11, pp. 5- 6 ,(1996) , 10.1109/64.511768
Donn Seeley, A Tour of the Worm ,(1988)
Matt Richtel, Super-Fast Computer Virus Heads Into the Workweek New York Times. ,(1999)
Fred Cohen, Computer viruses—theory and experiments Rogue programs: viruses, worms and Trojan horses. pp. 356- 378 ,(1990)