Skip to main content

Research Repository

See what's under the surface

Advanced Search

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'

Kim, Jungwon; Greensmith, Julie; Twycross, Jamie; Aickelin, Uwe

Authors

Jungwon Kim

Julie Greensmith

Jamie Twycross

Uwe Aickelin



Abstract

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.

Publication Date Jan 1, 2005
Peer Reviewed Peer Reviewed
APA6 Citation Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
Copyright Statement Copyright information regarding this work can be found at the following address: http://eprints.nottingh.../end_user_agreement.pdf

Files

05arcs_danger.pdf (80 Kb)
PDF

Copyright Statement
Copyright information regarding this work can be found at the following address: http://eprints.nottingham.ac.uk/end_user_agreement.pdf





You might also like



Downloadable Citations

;