2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed 2008
DOI: 10.1109/snpd.2008.160
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Code Detection Architecture Inspired by Human Immune System

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…We will optimize our matching algorithm and compare its performance against existing similar ones used in similar research. We proposed Malicious Code Detection Inspired by Human Immune System (MaCDI) [1] where two detection phases were introduced: Adolescent and Mature Phase. The first phase uses a malware profile matching mechanism, whereas the second phase uses a program profile instead.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…We will optimize our matching algorithm and compare its performance against existing similar ones used in similar research. We proposed Malicious Code Detection Inspired by Human Immune System (MaCDI) [1] where two detection phases were introduced: Adolescent and Mature Phase. The first phase uses a malware profile matching mechanism, whereas the second phase uses a program profile instead.…”
Section: Resultsmentioning
confidence: 99%
“…This step is essential to avoid the hard disk's fragmented disk surface becoming the actual cause of performance degradation. Enabling the hooking mechanism, we created our hook program [1] written in C#.NET in Visual Studio 2008. We utilized a framework that eased the hooking efforts.…”
Section: Experiments Planning and Operationmentioning
confidence: 99%
See 1 more Smart Citation