Skip to main content

A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory

  • Conference paper
  • First Online:
Book cover IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

  • 985 Accesses

Abstract

Artificial immune system (AIS) is a computational system inspired by the principles and processes of the Biological immune system which has the capabilities to learn, adapt, self tolerance and memories actions, which make it a good example that we can take for solving some major problems in many fields, including the problem of malware detection in the field of computer security. The main idea is to detect any type of files that trying to harm the computer system by infecting some executable software when these files running, spread it to other files or computers. In this paper, we proposed a framework to detect malware using the innate immune system combined with danger theory to eliminate tow major drawbacks of current malware detection methods; detection accuracy and high false positive alarms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Christodorescu M, Jha S, Seshia SA, Song D, Bryant RE (2005) Semantics-aware malware detection. In: IEEE symposium on security and privacy, 2005

    Google Scholar 

  2. Castro LND, Von Zuben FJ (1999) Artificial immune systems: part I—basic theory and applications. Technical Report, RT–DCA 01/99, Dec 1999

    Google Scholar 

  3. Timmis J, Knight T, Castro LND, Hart E (2004) An overview of artificial immune systems. 2004

    Google Scholar 

  4. Andrews L (2008) Immunity, St. Martin’s Minotaur 2008

    Google Scholar 

  5. Kuby J (1994) Immunology. vol 2nd edn. 1994

    Google Scholar 

  6. Parkin J, Cohen B (2001) An overview of the immune system. The Lancet 357(9270):1777–1789

    Article  Google Scholar 

  7. Medzhitov R (2001) Toll-like receptors and innate immunity. Nat Rev Immunol 1(2):135–145

    Article  Google Scholar 

  8. Matzinger P (1994) Tolerance, danger, and the extended family. Annu Rev Immunol 12:991–1045

    Article  Google Scholar 

  9. Ali MAM, Maarof MA (2012) Malware detection techniques using artificial immune system. In: Kim KJ, Ahn SJ, (eds) Proceedings of the international conference on IT convergence and security 2011, Springer, Netherlands, pp 575–587

    Google Scholar 

  10. Matzinger P (2002) The danger model: a renewed sense of self. Science 296(5566):301–305

    Article  Google Scholar 

  11. Janeway CA (1989) Approaching the asymptote? Evolution and revolution in immunology. Cold spring harbor symposia on quantitative biology, vol 54 Pt 1, pp 1–13

    Google Scholar 

Download references

Acknowledgments

This work and research is done by support of Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, Faculty of Mathematical Sciences, University of Khartoum, Sudan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Ahmed Mohamed Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Ali, M.A.M., Maarof, M.A. (2013). A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_4

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics