Alle Infos zum eBook verschenken
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security * Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China * Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues * Presents new concepts such as immune danger…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 12.48MB
- Qi XiaAttribute-based Encryption (ABE) (eBook, PDF)96,99 €
- Dennis Kengo OkaBuilding Secure Cars (eBook, PDF)116,99 €
- Cybersecurity in Humanities and Social Sciences (eBook, PDF)139,99 €
- Abderrazak MkadmiArchives in the Digital Age (eBook, PDF)139,99 €
- Security Issues and Privacy Concerns in Industry 4.0 Applications (eBook, PDF)164,99 €
- Shannon W. BrayImplementing Cryptography Using Python (eBook, PDF)32,99 €
- John JacksonCorporate Cybersecurity (eBook, PDF)95,99 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 208
- Erscheinungstermin: 25. August 2016
- Englisch
- ISBN-13: 9781119076278
- Artikelnr.: 45698545
- Verlag: John Wiley & Sons
- Seitenzahl: 208
- Erscheinungstermin: 25. August 2016
- Englisch
- ISBN-13: 9781119076278
- Artikelnr.: 45698545
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
About Author xxi
Acknowledgements xxiii
1 Artificial Immune System 1
1.1 Introduction 1
1.2 Biological Immune System 2
1.2.1 Overview 2
1.2.2 Adaptive Immune Process 3
1.3 Characteristics of BIS 4
1.4 Artificial Immune System 6
1.5 AIS Models and Algorithms 8
1.5.1 Negative Selection Algorithm 8
1.5.2 Clonal Selection Algorithm 9
1.5.3 Immune Network Model 11
1.5.4 Danger Theory 12
1.5.5 Immune Concentration 13
1.5.6 Other Methods 14
1.6 Characteristics of AIS 15
1.7 Applications of Artificial Immune System 16
1.7.1 Virus Detection 16
1.7.2 Spam Filtering 16
1.7.3 Robots 20
1.7.4 Control Engineering 21
1.7.5 Fault Diagnosis 22
1.7.6 Optimized Design 22
1.7.7 Data Analysis 22
1.8 Summary 22
2 Malware Detection 27
2.1 Introduction 27
2.2 Malware 28
2.2.1 Definition and Features 28
2.2.2 The Development Phases of Malware 29
2.3 Classic Malware Detection Approaches 30
2.3.1 Static Techniques 31
2.3.2 Dynamic Techniques 31
2.3.3 Heuristics 32
2.4 Immune Based Malware Detection Approaches 34
2.4.1 An Overview of Artificial Immune System 34
2.4.2 An Overview of Artificial Immune System for Malware Detection 35
2.4.3 An Immune Based Virus Detection System Using Affinity Vectors 36
2.4.4 A Hierarchical Artificial Immune Model for Virus Detection 38
2.4.5 A Malware Detection Model Based on a Negative Selection Algorithm with Penalty Factor 2.5 Summary 43
3 Immune Principle and Neural Networks Based Malware Detection 47
3.1 Introduction 47
3.2 Immune System for Malicious Executable Detection 48
3.2.1 Non-self Detection Principles 48
3.2.2 Anomaly Detection Based on Thickness 48
3.2.3 Relationship Between Diversity of Detector Representation and Anomaly Detection Hole 48
3.3 Experimental Dataset 48
3.4 Malware Detection Algorithm 49
3.4.1 Definition of Data Structures 49
3.4.2 Detection Principle and Algorithm 49
3.4.3 Generation of Detector Set 50
3.4.4 Extraction of Anomaly Characteristics 50
3.4.5 Classifier 52
3.5 Experiment 52
3.5.1 Experimental Procedure 53
3.5.2 Experimental Results 53
3.5.3 Comparison With Matthew G. Schultz's Method 55
3.6 Summary 57
4 Multiple-Point Bit Mutation Method of Detector Generation 59
4.1 Introduction 59
4.2 Current Detector Generating Algorithms 60
4.3 Growth Algorithms 60
4.4 Multiple Point Bit Mutation Method 62
4.5 Experiments 62
4.5.1 Experiments on Random Dataset 62
4.5.2 Change Detection of Static Files 65
4.6 Summary 65
5 Malware Detection System Using Affinity Vectors 67
5.1 Introduction 67
5.2 Malware Detection Using Affinity Vectors 68
5.2.1 Sliding Window 68
5.2.2 Negative Selection 68
5.2.3 Clonal Selection 69
5.2.4 Distances 70
5.2.5 Affinity Vector 71
5.2.6 Training Classifiers with Affinity Vectors 71
5.3 Evaluation of Affinity Vectors based malware detection System 73
5.3.1 Dataset 73
5.3.2 Length of Data Fragment 73
5.3.3 Experimental Results 73
5.4 Summary 74
6 Hierarchical Artificial Immune Model 79
About Author xxi
Acknowledgements xxiii
1 Artificial Immune System 1
1.1 Introduction 1
1.2 Biological Immune System 2
1.2.1 Overview 2
1.2.2 Adaptive Immune Process 3
1.3 Characteristics of BIS 4
1.4 Artificial Immune System 6
1.5 AIS Models and Algorithms 8
1.5.1 Negative Selection Algorithm 8
1.5.2 Clonal Selection Algorithm 9
1.5.3 Immune Network Model 11
1.5.4 Danger Theory 12
1.5.5 Immune Concentration 13
1.5.6 Other Methods 14
1.6 Characteristics of AIS 15
1.7 Applications of Artificial Immune System 16
1.7.1 Virus Detection 16
1.7.2 Spam Filtering 16
1.7.3 Robots 20
1.7.4 Control Engineering 21
1.7.5 Fault Diagnosis 22
1.7.6 Optimized Design 22
1.7.7 Data Analysis 22
1.8 Summary 22
2 Malware Detection 27
2.1 Introduction 27
2.2 Malware 28
2.2.1 Definition and Features 28
2.2.2 The Development Phases of Malware 29
2.3 Classic Malware Detection Approaches 30
2.3.1 Static Techniques 31
2.3.2 Dynamic Techniques 31
2.3.3 Heuristics 32
2.4 Immune Based Malware Detection Approaches 34
2.4.1 An Overview of Artificial Immune System 34
2.4.2 An Overview of Artificial Immune System for Malware Detection 35
2.4.3 An Immune Based Virus Detection System Using Affinity Vectors 36
2.4.4 A Hierarchical Artificial Immune Model for Virus Detection 38
2.4.5 A Malware Detection Model Based on a Negative Selection Algorithm with Penalty Factor 2.5 Summary 43
3 Immune Principle and Neural Networks Based Malware Detection 47
3.1 Introduction 47
3.2 Immune System for Malicious Executable Detection 48
3.2.1 Non-self Detection Principles 48
3.2.2 Anomaly Detection Based on Thickness 48
3.2.3 Relationship Between Diversity of Detector Representation and Anomaly Detection Hole 48
3.3 Experimental Dataset 48
3.4 Malware Detection Algorithm 49
3.4.1 Definition of Data Structures 49
3.4.2 Detection Principle and Algorithm 49
3.4.3 Generation of Detector Set 50
3.4.4 Extraction of Anomaly Characteristics 50
3.4.5 Classifier 52
3.5 Experiment 52
3.5.1 Experimental Procedure 53
3.5.2 Experimental Results 53
3.5.3 Comparison With Matthew G. Schultz's Method 55
3.6 Summary 57
4 Multiple-Point Bit Mutation Method of Detector Generation 59
4.1 Introduction 59
4.2 Current Detector Generating Algorithms 60
4.3 Growth Algorithms 60
4.4 Multiple Point Bit Mutation Method 62
4.5 Experiments 62
4.5.1 Experiments on Random Dataset 62
4.5.2 Change Detection of Static Files 65
4.6 Summary 65
5 Malware Detection System Using Affinity Vectors 67
5.1 Introduction 67
5.2 Malware Detection Using Affinity Vectors 68
5.2.1 Sliding Window 68
5.2.2 Negative Selection 68
5.2.3 Clonal Selection 69
5.2.4 Distances 70
5.2.5 Affinity Vector 71
5.2.6 Training Classifiers with Affinity Vectors 71
5.3 Evaluation of Affinity Vectors based malware detection System 73
5.3.1 Dataset 73
5.3.2 Length of Data Fragment 73
5.3.3 Experimental Results 73
5.4 Summary 74
6 Hierarchical Artificial Immune Model 79