Please use this identifier to cite or link to this item:
http://acervodigital.unesp.br/handle/11449/73443
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | De Oliveira, Isabela Liane | - |
dc.contributor.author | Grégio, André Ricardo Abed | - |
dc.contributor.author | Cansian, Adriano Mauro | - |
dc.date.accessioned | 2014-05-27T11:26:53Z | - |
dc.date.accessioned | 2016-10-25T18:37:38Z | - |
dc.date.available | 2014-05-27T11:26:53Z | - |
dc.date.available | 2016-10-25T18:37:38Z | - |
dc.date.issued | 2012-07-23 | - |
dc.identifier | http://dx.doi.org/10.1007/978-3-642-31128-4_21 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7336 LNCS, n. PART 4, p. 286-301, 2012. | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.issn | 1611-3349 | - |
dc.identifier.uri | http://hdl.handle.net/11449/73443 | - |
dc.identifier.uri | http://acervodigital.unesp.br/handle/11449/73443 | - |
dc.description.abstract | Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag. | en |
dc.format.extent | 286-301 | - |
dc.language.iso | eng | - |
dc.source | Scopus | - |
dc.subject | data mining | - |
dc.subject | human immune system | - |
dc.subject | malicious code | - |
dc.subject | Antigen detections | - |
dc.subject | Behavioral model | - |
dc.subject | Execution trace | - |
dc.subject | Human bodies | - |
dc.subject | Human immune systems | - |
dc.subject | Malicious codes | - |
dc.subject | Malware attacks | - |
dc.subject | Malware detection | - |
dc.subject | Malwares | - |
dc.subject | Network flows | - |
dc.subject | Chemical detection | - |
dc.subject | Computer aided network analysis | - |
dc.subject | Computer crime | - |
dc.subject | Data mining | - |
dc.subject | Detectors | - |
dc.subject | Network security | - |
dc.subject | Immunology | - |
dc.title | A malware detection system inspired on the human immune system | en |
dc.type | outro | - |
dc.contributor.institution | Universidade Estadual Paulista (UNESP) | - |
dc.contributor.institution | Renato Archer IT Research Center (CTI/MCT) | - |
dc.description.affiliation | São Paulo State University (Unesp), São José do Rio Preto, SP | - |
dc.description.affiliation | Renato Archer IT Research Center (CTI/MCT), Campinas, SP | - |
dc.description.affiliationUnesp | São Paulo State University (Unesp), São José do Rio Preto, SP | - |
dc.identifier.doi | 10.1007/978-3-642-31128-4_21 | - |
dc.identifier.wos | WOS:000308289700021 | - |
dc.rights.accessRights | Acesso restrito | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.identifier.scopus | 2-s2.0-84863940774 | - |
Appears in Collections: | Artigos, TCCs, Teses e Dissertações da Unesp |
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.