Most signature−based antivirus products are effective to detect known malwares but not unknown ma... more Most signature−based antivirus products are effective to detect known malwares but not unknown malwares or malwares' variants, which make them often lag behind malwares. Also most antivirus approaches are complex for two reasons. First, lots of malicious and benign codes as training dataset are difficult to collect. Second, they would consume lots of times when training classifiers. Immunity PE Malware Detection System (IPEMDS) was designed to give computer systems PE homeostatic capabilities analogous to those of the human immune system. Because the constraints of living and computational systems are very different, however, we cannot create a useful computer security mechanism by merely imitating biology. IPEMDS approach has been first to choose a set of requirements similar to those of the immune system. It then created abstractions that captured some of the important characteristics of biological homeostatic systems and then used these abstractions to guide the design of two levels of defense called them IPEMDS. The goal of IPEMDS are to obtain high detection rate and a very low false positive. IPEMDS enter in a challenge to a chief this goal from depending only on a finite numbers of benign files to classify between a new benign and malware executable files, and both of them unseen before by IPEMDS.
Most signature−based antivirus products are effective to detect known malwares but not unknown ma... more Most signature−based antivirus products are effective to detect known malwares but not unknown malwares or malwares' variants, which make them often lag behind malwares. Also most antivirus approaches are complex for two reasons. First, lots of malicious and benign codes as training dataset are difficult to collect. Second, they would consume lots of times when training classifiers. Immunity PE Malware Detection System (IPEMDS) was designed to give computer systems PE homeostatic capabilities analogous to those of the human immune system. Because the constraints of living and computational systems are very different, however, we cannot create a useful computer security mechanism by merely imitating biology. IPEMDS approach has been first to choose a set of requirements similar to those of the immune system. It then created abstractions that captured some of the important characteristics of biological homeostatic systems and then used these abstractions to guide the design of two levels of defense called them IPEMDS. The goal of IPEMDS are to obtain high detection rate and a very low false positive. IPEMDS enter in a challenge to a chief this goal from depending only on a finite numbers of benign files to classify between a new benign and malware executable files, and both of them unseen before by IPEMDS.
Uploads
Papers by najla dabagh