Web tap: detecting covert web traffic
Proceedings of the 11th ACM conference on Computer and communications security
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
LISA '04 Proceedings of the 18th USENIX conference on System administration
Why spyware poses multiple threats to security
Communications of the ACM - Spyware
Detecting Stealth Software with Strider GhostBuster
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Siren: Catching Evasive Malware (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Behavior-based spyware detection
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Immune system approaches to intrusion detection --- a review
Natural Computing: an international journal
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Detecting Bots Based on Keylogging Activities
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Spyware and Adware
A Sense of `Danger' for Windows Processes
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Detecting Software Keyloggers with Dendritic Cell Algorithm
CMC '10 Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 01
Bait your hook: a novel detection technique for keyloggers
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
Artificial Immune System (AIS) achieved some success in malware detection with its distributed, diverse and adaptive characteristics. However, in recent years, malware is evolving quickly in respect of stealth and complexity. This trend has brought a great challenge for AIS, especially when spyware emerged. To solve this problem, natural killer cells (NKs) which can lure latent viruses to expose themselves are introduced to AIS in this paper. We hope their counterparts can enhance the anti-latent capability of AIS by enticement strategy and collaboration with other AIS algorithms. Preliminary results show that artificial NKs can discover tiny abnormalities caused by novel spyware, and then release proper bait (called induction cytokines) to trigger the spyware's actions which will expose itself to further detection by AIS.