作者
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
发表日期
2008/6/1
研讨会论文
2008 IEEE congress on evolutionary computation (IEEE world congress on computational intelligence)
页码范围
1807-1816
出版商
IEEE
简介
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a ‘hot’ - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the ‘botmaster of a botnet’. In this work, we use the biologically inspired Dendritic Cell Algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation …
引用总数
200820092010201120122013201420152016201720182019202020212022202319184141341488542121
学术搜索中的文章
Y Al-Hammadi, U Aickelin, J Greensmith - 2008 IEEE congress on evolutionary computation …, 2008