Skip to main content

An Immune-Based Model for Computer Virus Detection

  • Conference paper
Cryptology and Network Security (CANS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3810))

Included in the following conference series:

Abstract

Inspired by biological immune systems, a new immune-based model for computer virus detection is proposed in this paper. Quantitative description of the model is given. A dynamic evolution model for self/nonself description is presented, which reduces the size of self set. Furthermore, an evolutive gene library is introduced to improve the generating efficiency of mature detectors, reducing the system time spending, false-negative and false-positive rates. Experiments show that this model has better time efficiency and detecting ability than the classical model ARTIS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. F-Secure Corporation’s Data Security Summary for 2004. F-Secure Corporation (April 2005), Available http://www.f-secure.com/2004/

  2. Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: Proc. of the USENIX Security Symposium, San Francisco, Marriott (2002)

    Google Scholar 

  3. Cohen, F.: Computer viruses: theory and experiments. Computers and Security 6, 22–35 (1987)

    Article  Google Scholar 

  4. Spafford, E.H.: Computer Viruses—A Form of Artificial Life? Technical Report, Purdue University (1994)

    Google Scholar 

  5. Swimmer, M.: Dynamic detection and classification of computer viruses using general behavior patterns. In: Proc. of the Fifth International Virus Bulletin Conference, Boston (1995)

    Google Scholar 

  6. Albert, R., Jeong, H., Barabasi, A.L.: Diameter of the world wide web. Nature 401, 130–131 (1999)

    Article  Google Scholar 

  7. Lloyd, A.L., May, R.M.: How viruses spread among computers and people. Science 292, 1316–1317 (2002)

    Article  Google Scholar 

  8. Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. E 66(035101) (2002)

    Google Scholar 

  9. Albert, R., Jeong, H., Barabasi, A.L.: Attack and error tolerance of complex networks. Nature 406, 378–382 (2002)

    Article  Google Scholar 

  10. Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network robustness and fragility: percolation on random graphs. Phys. Rev. Lett. 85, 5468–5471 (2002)

    Article  Google Scholar 

  11. Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer viruses. Science 304, 527–529 (2004)

    Article  Google Scholar 

  12. Perelson, A.S., Weisbuch, G.: Immunology for physicists. Review of Modern Physics 69(4), 1219–1263 (1997)

    Article  Google Scholar 

  13. De Castro, L.N., Timmis, J.I.: Artificial immune systems as a novel soft computing paradigm. Soft Computing Journal 7(8), 526–544 (2003)

    Google Scholar 

  14. Li, T.: An Introduction to Computer Network Security. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  15. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  16. Forrest, S., Perelson, A.S.: Self-nonself discrimination in a computer. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, pp. 202–213 (1994)

    Google Scholar 

  17. Hofmeyr, S.: An Immunological Model of Distributed Detection and its Application to Computer Security. Ph.D. dissertation, Univ. New Mexico (1999)

    Google Scholar 

  18. Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4), 443–473 (2000)

    Article  Google Scholar 

  19. Kephart, J.O., Arnold, W.C.: Automatic extraction of computer virus signatures. In: Proc. of the Fourth International Virus Bulletin Conference, St. Helier, Jersey, UK (1994)

    Google Scholar 

  20. Kephart, J.O., Sorkin, G.B., Swimmer, M., White, S.R.: Blueprint for a computer immune system. In: Proc. of the 1997 International Virus Bulletin Conference, San Francisco, California (1997)

    Google Scholar 

  21. Okamoto, T., Ishida, Y.: A distributed approach against computer viruses inspired by the immune system. IEICE Trans. on Communication E83-B(5), 908–915 (2000)

    Google Scholar 

  22. Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation 6(3), 252–280 (2002)

    Article  Google Scholar 

  23. Rabiner, L.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc. of the IEEE 77(2), 257–286 (1989)

    Article  Google Scholar 

  24. Jensen, R.S.: Immune system for virus detection and elimination. Master’s Thesis, Technical University of Denmark, DTU (2002)

    Google Scholar 

  25. LISYS (April 2005), Available http://www.cs.unm.edu/~forrest/software/lisys/

  26. Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences 48(5), 798–816 (2005)

    Google Scholar 

  27. Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin 50(17) (2005)

    Google Scholar 

  28. Li, T.: A new model of immune-based network surveillance and dynamic computer forensics. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol. 3611, pp. 799–808. Springer, Heidelberg (2005)

    Google Scholar 

  29. Xu, C., Li, T.: A weather forecast system based on artificial immune system. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol. 3611, pp. 795–798. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  30. Shen, J., Xie, S.: Probability and Statistics. Higher Education Press, Beijing (1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, T., Liu, X., Li, H. (2005). An Immune-Based Model for Computer Virus Detection. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_6

Download citation

  • DOI: https://doi.org/10.1007/11599371_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30849-2

  • Online ISBN: 978-3-540-32298-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics