'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system....

Full description

Bibliographic Details
Main Authors: Kim, Jungwon, Greensmith, Julie, Twycross, Jamie, Aickelin, Uwe
Format: Conference or Workshop Item
Language:English
Published: 2005
Online Access:https://eprints.nottingham.ac.uk/302/
_version_ 1848790390512025600
author Kim, Jungwon
Greensmith, Julie
Twycross, Jamie
Aickelin, Uwe
author_facet Kim, Jungwon
Greensmith, Julie
Twycross, Jamie
Aickelin, Uwe
author_sort Kim, Jungwon
building Nottingham Research Data Repository
collection Online Access
description The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
first_indexed 2025-11-14T18:11:51Z
format Conference or Workshop Item
id nottingham-302
institution University of Nottingham Malaysia Campus
institution_category Local University
language English
last_indexed 2025-11-14T18:11:51Z
publishDate 2005
recordtype eprints
repository_type Digital Repository
spelling nottingham-3022021-05-31T14:47:38Z https://eprints.nottingham.ac.uk/302/ 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' Kim, Jungwon Greensmith, Julie Twycross, Jamie Aickelin, Uwe The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls. 2005 Conference or Workshop Item PeerReviewed application/pdf en https://eprints.nottingham.ac.uk/302/1/05arcs_danger.pdf Kim, Jungwon, Greensmith, Julie, Twycross, Jamie and Aickelin, Uwe (2005) 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. In: Adaptive and Resilient Computing Security Workshop (ARCS-05), 2005, Santa Fe, USA.
spellingShingle Kim, Jungwon
Greensmith, Julie
Twycross, Jamie
Aickelin, Uwe
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
title 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
title_full 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
title_fullStr 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
title_full_unstemmed 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
title_short 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
title_sort 'malicious code execution detection and response immune system inspired by the danger theory'
url https://eprints.nottingham.ac.uk/302/