An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization

This paper proposes an immune concentration based virus detection approach which utilizes a two-element concentration vector to construct the feature In this approach, ‘self' and ‘nonself' concentrations are extracted through ‘self' and ‘nonself' detector libraries, respectively, to form a vector with two elements of concentrations for characterizing the program efficiently and fast Several classifiers including k-nearest neighbor (KNN), RBF neural network and support vector machine (SVM) with this vector as input are then employed to classify the programs The selection of detector library determinant and parameters associated with a certain classifier is here considered as an optimization problem aiming at maximizing the accuracy of classification A clonal particle swarm optimization (CPSO) algorithm is used for this purpose Experimental results demonstrate that the proposed approach not only has a very much fast speed but also gives around 98% of accuracy under optimum conditions.

[1]  Yuval Elovici,et al.  Unknown malcode detection via text categorization and the imbalance problem , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[2]  Ying Tan,et al.  A three-layer back-propagation neural network for spam detection using artificial immune concentration , 2009, Soft Comput..

[3]  Lilly Suriani Affendey,et al.  Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[4]  Jau-Hwang Wang,et al.  Virus detection using data mining techinques , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[5]  Somesh Jha,et al.  A semantics-based approach to malware detection , 2008, TOPL.

[6]  Y. Tan,et al.  Clonal particle swarm optimization and its applications , 2007, 2007 IEEE Congress on Evolutionary Computation.

[7]  Jau-Hwang Wang,et al.  Intelligent automatic malicious code signatures extraction , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[8]  Harris Drucker,et al.  Support vector machines for spam categorization , 1999, IEEE Trans. Neural Networks.

[9]  Ying Tan,et al.  A Virus Detection System Based on Artificial Immune System , 2009, 2009 International Conference on Computational Intelligence and Security.

[10]  Ying Tan,et al.  A Hierarchical Artificial Immune Model for Virus Detection , 2009, 2009 International Conference on Computational Intelligence and Security.

[11]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[12]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[13]  Ying Tan,et al.  Concentration based feature construction approach for spam detection , 2009, 2009 International Joint Conference on Neural Networks.

[14]  Nathalie Japkowicz,et al.  A Feature Selection and Evaluation Scheme for Computer Virus Detection , 2006, Sixth International Conference on Data Mining (ICDM'06).

[15]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..