'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system....
| Main Authors: | , , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Online Access: | https://eprints.nottingham.ac.uk/302/ |
| _version_ | 1848790390512025600 |
|---|---|
| author | Kim, Jungwon Greensmith, Julie Twycross, Jamie Aickelin, Uwe |
| author_facet | Kim, Jungwon Greensmith, Julie Twycross, Jamie Aickelin, Uwe |
| author_sort | Kim, Jungwon |
| building | Nottingham Research Data Repository |
| collection | Online Access |
| description | The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls. |
| first_indexed | 2025-11-14T18:11:51Z |
| format | Conference or Workshop Item |
| id | nottingham-302 |
| institution | University of Nottingham Malaysia Campus |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T18:11:51Z |
| publishDate | 2005 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | nottingham-3022021-05-31T14:47:38Z https://eprints.nottingham.ac.uk/302/ 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' Kim, Jungwon Greensmith, Julie Twycross, Jamie Aickelin, Uwe The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls. 2005 Conference or Workshop Item PeerReviewed application/pdf en https://eprints.nottingham.ac.uk/302/1/05arcs_danger.pdf Kim, Jungwon, Greensmith, Julie, Twycross, Jamie and Aickelin, Uwe (2005) 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. In: Adaptive and Resilient Computing Security Workshop (ARCS-05), 2005, Santa Fe, USA. |
| spellingShingle | Kim, Jungwon Greensmith, Julie Twycross, Jamie Aickelin, Uwe 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' |
| title | 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' |
| title_full | 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' |
| title_fullStr | 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' |
| title_full_unstemmed | 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' |
| title_short | 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' |
| title_sort | 'malicious code execution detection and response immune system inspired by the danger theory' |
| url | https://eprints.nottingham.ac.uk/302/ |