About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Workshop on Connecting Health: Using IT to Assist Patient Recovery

Research Article

Anti-virus Security and Robustness of Heterogeneous Immune Static Network

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/ICST.QSHINE2008.4265,
        author={Tao Gong},
        title={Anti-virus Security and Robustness of Heterogeneous Immune Static Network},
        proceedings={2nd International ICST Workshop on Connecting Health: Using IT to Assist Patient Recovery},
        publisher={ACM},
        proceedings_a={CONNECTINGHEALTH},
        year={2010},
        month={5},
        keywords={immune model immune network security anti-virus},
        doi={10.4108/ICST.QSHINE2008.4265}
    }
    
  • Tao Gong
    Year: 2010
    Anti-virus Security and Robustness of Heterogeneous Immune Static Network
    CONNECTINGHEALTH
    ICST
    DOI: 10.4108/ICST.QSHINE2008.4265
Tao Gong

    Abstract

    Unknown viruses are dangerous for networks, but traditional approaches for recognizing the features of viruses are not good at detecting the unknown viruses. To overcome the bottleneck, a normal model and an immune computation model were proposed with self/non-self representation to detect recognize and eliminate worms in a heterogeneous e-learning network. Inspired from the natural immune system, the immune computation included the steps of detecting self/non-self, recognizing known non-self, learning unknown non-self and eliminating non-self. The self/non-self detection was based on querying in the self database and the self database was built on the normal model of the static network system. After the detection, the recognition of known non-self was based on querying in the non-self database and the recognition of unknown non-self was based on learning unknown non-self. The learning algorithm was designed on the neural network or the learning mechanism from examples. The last step was elimination of all the non-self and failover of the damaged Web system. The immunization of the static network system was programmed with Java to test effectiveness of the approach, after the static network system was infected by some worms. The results of the immunization simulations show that, the immune program can detect all the worms, recognize all known worms and most unknown worms, and eliminate the worms. Moreover, the damaged files of the static network system can all be repaired through the normal model and immunization. Therefore, the normal model and the immune computation model of the static network system are effective in some anti-virus applications.

    Keywords
    immune model immune network security anti-virus
    Published
    2010-05-16
    Publisher
    ACM
    Modified
    2010-05-16
    http://dx.doi.org/10.4108/ICST.QSHINE2008.4265
    Copyright © 2008–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL