- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security _ Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China _ Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues _ Presents new concepts such as immune danger…mehr
Andere Kunden interessierten sich auch für
- Alissa KnightHacking Connected Cars45,99 €
- Security and Privacy in Cyber-Physical Systems140,99 €
- Shannon W. BrayImplementing Cryptography Using Python43,99 €
- John JacksonCorporate Cybersecurity128,99 €
- William PuechMultimedia Security 1189,99 €
- Privacy Preservation of Genomic and Medical Data270,99 €
- Security Issues and Privacy Concerns in Industry 4.0 Applications224,99 €
-
-
-
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security
_ Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China
_ Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues
_ Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
_ Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China
_ Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues
_ Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Wiley & Sons / Wiley-IEEE Computer Society Press
- Artikelnr. des Verlages: 1W119076280
- 1. Auflage
- Seitenzahl: 208
- Erscheinungstermin: 27. Juni 2016
- Englisch
- Abmessung: 236mm x 157mm x 18mm
- Gewicht: 476g
- ISBN-13: 9781119076285
- ISBN-10: 1119076285
- Artikelnr.: 42204786
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Wiley & Sons / Wiley-IEEE Computer Society Press
- Artikelnr. des Verlages: 1W119076280
- 1. Auflage
- Seitenzahl: 208
- Erscheinungstermin: 27. Juni 2016
- Englisch
- Abmessung: 236mm x 157mm x 18mm
- Gewicht: 476g
- ISBN-13: 9781119076285
- ISBN-10: 1119076285
- Artikelnr.: 42204786
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Ying Tan, PhD, is a Professor of Peking University, China. Dr. Tan is also the director of CIL@PKU. He serves as the editor-in-chief of International Journal of Computational Intelligence and Pattern Recognition, associate editor of IEEE Transactions on Cybernetics, IEEE Transactions on Neural Networks and Learning Systems, and International Journal of Swarm Intelligence Research, and also as an Editor of Springer's Lecture Notes on Computer Science (LNCS). He is the founder and chair of the ICSI International Conference series. Dr. Tan is a senior member of the IEEE, ACM, and CIE. He has published over two-hundred papers in refereed journals and conferences in areas such as computational intelligence, swarm intelligence, data mining, and pattern recognition for information security.
Preface xiii
About Author xxi
Acknowledgements xxiii
1 Artificial Immune System 1
1.1 Introduction 1
1.2 Biological Immune System 2
1.2.1 Overview 2
1.2.2 Adaptive Immune Process 3
1.3 Characteristics of BIS 4
1.4 Artificial Immune System 6
1.5 AIS Models and Algorithms 8
1.5.1 Negative Selection Algorithm 8
1.5.2 Clonal Selection Algorithm 9
1.5.3 Immune Network Model 11
1.5.4 Danger Theory 12
1.5.5 Immune Concentration 13
1.5.6 Other Methods 14
1.6 Characteristics of AIS 15
1.7 Applications of Artificial Immune System 16
1.7.1 Virus Detection 16
1.7.2 Spam Filtering 16
1.7.3 Robots 20
1.7.4 Control Engineering 21
1.7.5 Fault Diagnosis 22
1.7.6 Optimized Design 22
1.7.7 Data Analysis 22
1.8 Summary 22
2 Malware Detection 27
2.1 Introduction 27
2.2 Malware 28
2.2.1 Definition and Features 28
2.2.2 The Development Phases of Malware 29
2.3 Classic Malware Detection Approaches 30
2.3.1 Static Techniques 31
2.3.2 Dynamic Techniques 31
2.3.3 Heuristics 32
2.4 Immune Based Malware Detection Approaches 34
2.4.1 An Overview of Artificial Immune System 34
2.4.2 An Overview of Artificial Immune System for Malware Detection 35
2.4.3 An Immune Based Virus Detection System Using Affinity Vectors 36
2.4.4 A Hierarchical Artificial Immune Model for Virus Detection 38
2.4.5 A Malware Detection Model Based on a Negative Selection Algorithm with Penalty Factor 2.5 Summary 43
3 Immune Principle and Neural Networks Based Malware Detection 47
3.1 Introduction 47
3.2 Immune System for Malicious Executable Detection 48
3.2.1 Non-self Detection Principles 48
3.2.2 Anomaly Detection Based on Thickness 48
3.2.3 Relationship Between Diversity of Detector Representation and Anomaly Detection Hole 48
3.3 Experimental Dataset 48
3.4 Malware Detection Algorithm 49
3.4.1 Definition of Data Structures 49
3.4.2 Detection Principle and Algorithm 49
3.4.3 Generation of Detector Set 50
3.4.4 Extraction of Anomaly Characteristics 50
3.4.5 Classifier 52
3.5 Experiment 52
3.5.1 Experimental Procedure 53
3.5.2 Experimental Results 53
3.5.3 Comparison With Matthew G. Schultz's Method 55
3.6 Summary 57
4 Multiple-Point Bit Mutation Method of Detector Generation 59
4.1 Introduction 59
4.2 Current Detector Generating Algorithms 60
4.3 Growth Algorithms 60
4.4 Multiple Point Bit Mutation Method 62
4.5 Experiments 62
4.5.1 Experiments on Random Dataset 62
4.5.2 Change Detection of Static Files 65
4.6 Summary 65
5 Malware Detection System Using Affinity Vectors 67
5.1 Introduction 67
5.2 Malware Detection Using Affinity Vectors 68
5.2.1 Sliding Window 68
5.2.2 Negative Selection 68
5.2.3 Clonal Selection 69
5.2.4 Distances 70
5.2.5 Affinity Vector 71
5.2.6 Training Classifiers with Affinity Vectors 71
5.3 Evaluation of Affinity Vectors based malware detection System 73
5.3.1 Dataset 73
5.3.2 Length of Data Fragment 73
5.3.3 Experimental Results 73
5.4 Summary 74
6 Hierarchical Artificial Immune Model 79
About Author xxi
Acknowledgements xxiii
1 Artificial Immune System 1
1.1 Introduction 1
1.2 Biological Immune System 2
1.2.1 Overview 2
1.2.2 Adaptive Immune Process 3
1.3 Characteristics of BIS 4
1.4 Artificial Immune System 6
1.5 AIS Models and Algorithms 8
1.5.1 Negative Selection Algorithm 8
1.5.2 Clonal Selection Algorithm 9
1.5.3 Immune Network Model 11
1.5.4 Danger Theory 12
1.5.5 Immune Concentration 13
1.5.6 Other Methods 14
1.6 Characteristics of AIS 15
1.7 Applications of Artificial Immune System 16
1.7.1 Virus Detection 16
1.7.2 Spam Filtering 16
1.7.3 Robots 20
1.7.4 Control Engineering 21
1.7.5 Fault Diagnosis 22
1.7.6 Optimized Design 22
1.7.7 Data Analysis 22
1.8 Summary 22
2 Malware Detection 27
2.1 Introduction 27
2.2 Malware 28
2.2.1 Definition and Features 28
2.2.2 The Development Phases of Malware 29
2.3 Classic Malware Detection Approaches 30
2.3.1 Static Techniques 31
2.3.2 Dynamic Techniques 31
2.3.3 Heuristics 32
2.4 Immune Based Malware Detection Approaches 34
2.4.1 An Overview of Artificial Immune System 34
2.4.2 An Overview of Artificial Immune System for Malware Detection 35
2.4.3 An Immune Based Virus Detection System Using Affinity Vectors 36
2.4.4 A Hierarchical Artificial Immune Model for Virus Detection 38
2.4.5 A Malware Detection Model Based on a Negative Selection Algorithm with Penalty Factor 2.5 Summary 43
3 Immune Principle and Neural Networks Based Malware Detection 47
3.1 Introduction 47
3.2 Immune System for Malicious Executable Detection 48
3.2.1 Non-self Detection Principles 48
3.2.2 Anomaly Detection Based on Thickness 48
3.2.3 Relationship Between Diversity of Detector Representation and Anomaly Detection Hole 48
3.3 Experimental Dataset 48
3.4 Malware Detection Algorithm 49
3.4.1 Definition of Data Structures 49
3.4.2 Detection Principle and Algorithm 49
3.4.3 Generation of Detector Set 50
3.4.4 Extraction of Anomaly Characteristics 50
3.4.5 Classifier 52
3.5 Experiment 52
3.5.1 Experimental Procedure 53
3.5.2 Experimental Results 53
3.5.3 Comparison With Matthew G. Schultz's Method 55
3.6 Summary 57
4 Multiple-Point Bit Mutation Method of Detector Generation 59
4.1 Introduction 59
4.2 Current Detector Generating Algorithms 60
4.3 Growth Algorithms 60
4.4 Multiple Point Bit Mutation Method 62
4.5 Experiments 62
4.5.1 Experiments on Random Dataset 62
4.5.2 Change Detection of Static Files 65
4.6 Summary 65
5 Malware Detection System Using Affinity Vectors 67
5.1 Introduction 67
5.2 Malware Detection Using Affinity Vectors 68
5.2.1 Sliding Window 68
5.2.2 Negative Selection 68
5.2.3 Clonal Selection 69
5.2.4 Distances 70
5.2.5 Affinity Vector 71
5.2.6 Training Classifiers with Affinity Vectors 71
5.3 Evaluation of Affinity Vectors based malware detection System 73
5.3.1 Dataset 73
5.3.2 Length of Data Fragment 73
5.3.3 Experimental Results 73
5.4 Summary 74
6 Hierarchical Artificial Immune Model 79
Preface xiii
About Author xxi
Acknowledgements xxiii
1 Artificial Immune System 1
1.1 Introduction 1
1.2 Biological Immune System 2
1.2.1 Overview 2
1.2.2 Adaptive Immune Process 3
1.3 Characteristics of BIS 4
1.4 Artificial Immune System 6
1.5 AIS Models and Algorithms 8
1.5.1 Negative Selection Algorithm 8
1.5.2 Clonal Selection Algorithm 9
1.5.3 Immune Network Model 11
1.5.4 Danger Theory 12
1.5.5 Immune Concentration 13
1.5.6 Other Methods 14
1.6 Characteristics of AIS 15
1.7 Applications of Artificial Immune System 16
1.7.1 Virus Detection 16
1.7.2 Spam Filtering 16
1.7.3 Robots 20
1.7.4 Control Engineering 21
1.7.5 Fault Diagnosis 22
1.7.6 Optimized Design 22
1.7.7 Data Analysis 22
1.8 Summary 22
2 Malware Detection 27
2.1 Introduction 27
2.2 Malware 28
2.2.1 Definition and Features 28
2.2.2 The Development Phases of Malware 29
2.3 Classic Malware Detection Approaches 30
2.3.1 Static Techniques 31
2.3.2 Dynamic Techniques 31
2.3.3 Heuristics 32
2.4 Immune Based Malware Detection Approaches 34
2.4.1 An Overview of Artificial Immune System 34
2.4.2 An Overview of Artificial Immune System for Malware Detection 35
2.4.3 An Immune Based Virus Detection System Using Affinity Vectors 36
2.4.4 A Hierarchical Artificial Immune Model for Virus Detection 38
2.4.5 A Malware Detection Model Based on a Negative Selection Algorithm with Penalty Factor 2.5 Summary 43
3 Immune Principle and Neural Networks Based Malware Detection 47
3.1 Introduction 47
3.2 Immune System for Malicious Executable Detection 48
3.2.1 Non-self Detection Principles 48
3.2.2 Anomaly Detection Based on Thickness 48
3.2.3 Relationship Between Diversity of Detector Representation and Anomaly Detection Hole 48
3.3 Experimental Dataset 48
3.4 Malware Detection Algorithm 49
3.4.1 Definition of Data Structures 49
3.4.2 Detection Principle and Algorithm 49
3.4.3 Generation of Detector Set 50
3.4.4 Extraction of Anomaly Characteristics 50
3.4.5 Classifier 52
3.5 Experiment 52
3.5.1 Experimental Procedure 53
3.5.2 Experimental Results 53
3.5.3 Comparison With Matthew G. Schultz's Method 55
3.6 Summary 57
4 Multiple-Point Bit Mutation Method of Detector Generation 59
4.1 Introduction 59
4.2 Current Detector Generating Algorithms 60
4.3 Growth Algorithms 60
4.4 Multiple Point Bit Mutation Method 62
4.5 Experiments 62
4.5.1 Experiments on Random Dataset 62
4.5.2 Change Detection of Static Files 65
4.6 Summary 65
5 Malware Detection System Using Affinity Vectors 67
5.1 Introduction 67
5.2 Malware Detection Using Affinity Vectors 68
5.2.1 Sliding Window 68
5.2.2 Negative Selection 68
5.2.3 Clonal Selection 69
5.2.4 Distances 70
5.2.5 Affinity Vector 71
5.2.6 Training Classifiers with Affinity Vectors 71
5.3 Evaluation of Affinity Vectors based malware detection System 73
5.3.1 Dataset 73
5.3.2 Length of Data Fragment 73
5.3.3 Experimental Results 73
5.4 Summary 74
6 Hierarchical Artificial Immune Model 79
About Author xxi
Acknowledgements xxiii
1 Artificial Immune System 1
1.1 Introduction 1
1.2 Biological Immune System 2
1.2.1 Overview 2
1.2.2 Adaptive Immune Process 3
1.3 Characteristics of BIS 4
1.4 Artificial Immune System 6
1.5 AIS Models and Algorithms 8
1.5.1 Negative Selection Algorithm 8
1.5.2 Clonal Selection Algorithm 9
1.5.3 Immune Network Model 11
1.5.4 Danger Theory 12
1.5.5 Immune Concentration 13
1.5.6 Other Methods 14
1.6 Characteristics of AIS 15
1.7 Applications of Artificial Immune System 16
1.7.1 Virus Detection 16
1.7.2 Spam Filtering 16
1.7.3 Robots 20
1.7.4 Control Engineering 21
1.7.5 Fault Diagnosis 22
1.7.6 Optimized Design 22
1.7.7 Data Analysis 22
1.8 Summary 22
2 Malware Detection 27
2.1 Introduction 27
2.2 Malware 28
2.2.1 Definition and Features 28
2.2.2 The Development Phases of Malware 29
2.3 Classic Malware Detection Approaches 30
2.3.1 Static Techniques 31
2.3.2 Dynamic Techniques 31
2.3.3 Heuristics 32
2.4 Immune Based Malware Detection Approaches 34
2.4.1 An Overview of Artificial Immune System 34
2.4.2 An Overview of Artificial Immune System for Malware Detection 35
2.4.3 An Immune Based Virus Detection System Using Affinity Vectors 36
2.4.4 A Hierarchical Artificial Immune Model for Virus Detection 38
2.4.5 A Malware Detection Model Based on a Negative Selection Algorithm with Penalty Factor 2.5 Summary 43
3 Immune Principle and Neural Networks Based Malware Detection 47
3.1 Introduction 47
3.2 Immune System for Malicious Executable Detection 48
3.2.1 Non-self Detection Principles 48
3.2.2 Anomaly Detection Based on Thickness 48
3.2.3 Relationship Between Diversity of Detector Representation and Anomaly Detection Hole 48
3.3 Experimental Dataset 48
3.4 Malware Detection Algorithm 49
3.4.1 Definition of Data Structures 49
3.4.2 Detection Principle and Algorithm 49
3.4.3 Generation of Detector Set 50
3.4.4 Extraction of Anomaly Characteristics 50
3.4.5 Classifier 52
3.5 Experiment 52
3.5.1 Experimental Procedure 53
3.5.2 Experimental Results 53
3.5.3 Comparison With Matthew G. Schultz's Method 55
3.6 Summary 57
4 Multiple-Point Bit Mutation Method of Detector Generation 59
4.1 Introduction 59
4.2 Current Detector Generating Algorithms 60
4.3 Growth Algorithms 60
4.4 Multiple Point Bit Mutation Method 62
4.5 Experiments 62
4.5.1 Experiments on Random Dataset 62
4.5.2 Change Detection of Static Files 65
4.6 Summary 65
5 Malware Detection System Using Affinity Vectors 67
5.1 Introduction 67
5.2 Malware Detection Using Affinity Vectors 68
5.2.1 Sliding Window 68
5.2.2 Negative Selection 68
5.2.3 Clonal Selection 69
5.2.4 Distances 70
5.2.5 Affinity Vector 71
5.2.6 Training Classifiers with Affinity Vectors 71
5.3 Evaluation of Affinity Vectors based malware detection System 73
5.3.1 Dataset 73
5.3.2 Length of Data Fragment 73
5.3.3 Experimental Results 73
5.4 Summary 74
6 Hierarchical Artificial Immune Model 79