期刊文献+

基于MHC的恶意代码检测方法

MHC-inspired approach for malicious code detection
在线阅读 下载PDF
导出
摘要 受生物免疫系统中主要组织相容性复合体MHC(major histocompatibility complex)分子特性的启发,提出了一种基于MHC的恶意代码检测方法MCDMHC。对抗体(检测器)恒定区和可变区分别进行编码,恒定区由MHC代码组成且保持相对稳定,这有利于保存优秀抗体基因;可变区的代码在疫苗的作用下有导向的变异,来快速获得多样性抗体以检测未知恶意代码。且建立了自体与非自体、抗原提呈以及抗体生成的动态演化方程。通过恶意代码检测对比实验表明,该方法对于恶意代码的检测率优于典型的基于免疫的AISCSA方法。 By drawing inspiration from the features oi major histocompatibility conpncx (MHC) in biological immune system,an MHC-inspired approach of malicious code detection was proposed. The antibody (detector) consisted of the constant region and the variable region. The constant region filled with MHC strings was to preserve outstanding antibody genes. The variable region composed of other antibodies genes fragments, was to improve the antibody diversity by mutation. The dynamic evolution of self and nonself, the presentation of antigen and the generation of antibody were discussed. Experiments were conducted on 100 malicious codes from the wildlist. Results indicate that this approach performs a relatively higher detection rate of the unknown malicious codes than that of AISCSA, a typical immune-based approach.
出处 《解放军理工大学学报(自然科学版)》 EI 北大核心 2009年第4期344-349,共6页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60573130 60502011 60873246) 国家863计划资助项目(2006AA01Z435) 国家教育部博士点基金资助项目(20070610032)
关键词 恶意代码 人工免疫系统 主要组织相容性复合体 抗体 malicious code artificial immune system MHC(major histocompatibility complex) antibody
  • 相关文献

参考文献14

  • 1RABINOVITCH E. Protect your users against the latest web-based threat: malicious code on caching servers [J]. IEEE Communications Magazine, 2007, 45(3): 20-22.
  • 2RICHARD F, EUGENE H S. Happy birthday, dear viruses[J]. Science, 2007(317).. 210-211.
  • 3BALTHROP J, FORREST S, NEWMAN MEJ. et al. Technological networks and the spread of computer viruses[J]. Science, 2004 (304) : 527-529.
  • 4LI Tao. Computer immunology [M]. Beijing: Publishing House of Electronics Industry, 2004.
  • 5FORREST S, PERELSON A S, ALLEN L, et al. Self-nonself discrimination in a computer [C]. Oakland: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1994.
  • 6FORREST S,BEAVCHEMIN C. Computer immunology[J] Immunolo-gical Reviews, 2007, 216(1) : 176- 197.
  • 7KEPHART J O. A biologically inspired immune system for computers[C]. Cambridge,MA : Proceed-ings on the 4^thlnternational Workshop on the Systhesis and Simulation of Living Systems and Artificial Life, 1994.
  • 8LAMONT G B,ROBERT E, MDAVID A Van V. A distributed architecture for an adaptive computer virus immune system[C]. Sam Diego:Proceedings of IEEE International Conference on Systems, Man, and Cy- bernetics, 1998.
  • 9HARMER P K, WILLIAMS P D, GUNSCH G H,et al. An artificial immune system architecture for computer security applications [J]. IEEE Transacctions on Evolutionary Computation, 2002, 6 (3): 252-280.
  • 10ZHOU Zheng, LIU Yi, LI Jian, et al. A new computer self-immune model against malicious codes[C]. Washington, DC: Proceedings of First International Symposium on Data, Privacy and E-Commerce, 2007.

二级参考文献10

  • 1Butler D.Computer security: who’s been looking at your data[].Nature.2002
  • 2Li T.Computer Immunology[]..2004
  • 3Cheng S L,Tan R,Xong W L, et al.Computer Virus and its Protection Techniques[]..2004
  • 4Kephart J O,Arnold W C.Automatic extraction of computer virus signatures[].Proc of the Fourth International Virus Bulletin Conference.2001
  • 5Sheng J,Xie S Q.The Theory of Probability and Mathematical Statistics[]..1989
  • 6Pu J,Ji J F,Yi L Z, et al.User Manual for MATLAB Version 6.0[]..2002
  • 7Balthrop J,Forrest S,Newman M E J,et al.Technological networks and the spread of computer viruses[].Science.2004
  • 8P D’ haeseleer.An Immunological Approach to Change Detection: Theoretical Results[].Proc of the th IEEE Computer Security Foundations Workshopg.1996
  • 9Perelson A S,Weisbuch G.Immunology for physicists[].Reviews of Modern Physics.1997
  • 10Forrest S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[].Proceedings of the IEEE Symposium on Research in Security and Privacy.1994

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部