Computer Science – Artificial Intelligence
Scientific paper
2010-03-22
Proceedings of Adaptive and Resilient Computing Security Workshop (ARCS-05), Santa Fe, USA, 2005,
Computer Science
Artificial Intelligence
4 pages, 1 table, Adaptive and Resilient Computing Security Workshop (ARCS-05), Santa Fe, USA
Scientific paper
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Aickelin Uwe
Greensmith Julie
Kim Jungwon
Twycross Jamie
No associations
LandOfFree
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-206442