Malware Attack by Using IIMDPS

Murugan S*, K.Kuppusamy**
* Research Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India.
** Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India.
Periodicity:March - May'2015
DOI : https://doi.org/10.26634/jcom.3.1.3436

Abstract

This paper focuses on preventing Unknown Malware attack by using Intelligence Intrusion Multi Detection Prevention System (IIDPS). It describes the state's overall requirements regarding the acquisition of preventing unknown malware with the help of mathematical scheme (Euler Diagram, Allen Algebra) and a few models with newly designed algorithm. It is designed to provide a deeper understanding of existing intrusion detection principles with intelligence strategies, that will be responsible for acquiring unknown malware. It compares the false positive rate and false negative rate, which will be proven by conducting different experiments with WEKA simulation.

Keywords

Intelligence Intrusion Detection Prevention System (IIDPS), Unknown Malware, Intelligence Intrusion Multi Detection Prevention Systems (IIMDPS).

How to Cite this Article?

Murugan, S., and Kuppusamy, K. (2015). Malware Attack by Using IIMPDS. i-manager’s Journal on Computer Science, 3(1), 5-14. https://doi.org/10.26634/jcom.3.1.3436

References

[1]. Chebrolu S, Abraham A, Thomas JP, (2005). “Feature Detection and Ensemble Design of Intrusion Detection Systems,” Computer Security, Vol.24, pp.295–307.
[2]. Chen Y, Abraham A, Yang J, (2005). “Feature Deduction and Intrusion Detection Using Flexible Neural nd Trees”, In 2 IEEE International Symposium on Neural Networks, pp.1-4.
[3]. Chen, ZL. Gao, and K. Kwiat, (2003). “Modeling the nd Spread of Active Worms”, Proceedings of 22 Annual Joint Conference of the IEEE Computer and Communications Societies, pp.1890-1900.
[4]. Chou T.S, Yen KK, (2007). “Fuzzy Belief K-Nearest Neighbors Anomaly Detection of User to Root and Remote to Local Attacks”, IEEE Workshop on Information Assurance, pp.207–213.
[5]. Cohen F, (1987). ”Computer Viruses: Theory and Experiments,” Computer Security, Vol.6(1), pp.22–35.
[6]. Ghosh AK, Schwartzbard A, (2004), “A Study in Using Neural Networks for Anomaly and Misuse Detection,” In Usenix Security Symposium, Washington, DC.
[7]. Ghosh AK, Schwartzbard A, Schatz M, (1999). “Learning program Behavior Profiles for Intrusion Detection,” Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USENIX.
[8]. Livadas C, Walsh B, Lapsley D, Strayer T, (2006). “Using Machine Learning Techniques to Identify Botnet Traffic,” nd 2 IEEE LCN workshop on network security (WNS), Tampa, FL, USA.
[9]. Meystel, A.M. and Albus, J.M, (2002). “Intelligent Systems Architecture, Design, and Control,” New York, New York, John Wiley & Sons, Inc.
[10]. Mukkamala S, Janoski G, Sung A, (2001). “Monitoring Systsem Security Using Neural Networks and Support Vector Machines,” International Workshop on Hybrid Intelligent Systems, pp.121–138.
[11]. Mukkamala S, Sung A, Abraham, (2004). “Designing Intrusion Detection Systems: Architectures and Perspectives”, The International Engineering Consortium (IEC) Annual Review of Communications, Vol.57, pp.1229–1241.
[12]. Mukkamala S, Sung A, Abraham, (2007). “Hybrid Multi-agent Framework for Detection of Stealthy Probe,” Appl Soft Computing, Vol.7(3), pp.631–641.
[13]. Mukkamala S, Sung AH, Abraham A, (2003). “Intrusion Detection Using Ensemble of Soft Computing rd Paradigms,” 3 International Conference on Intelligent Systems Design and Applications, Advances in Soft Computing, pp.239–248.
[14]. Mukkamala S, Sung AH, Abraham A, (2004). “Modeling Intrusion Detection Systems Using Linear th Genetic Programming Approach”, 17 International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, Vol.30(29), pp.633–642.
[15]. Ourston D, Matzner S, Stump W, Hopkins B, (2004). “Coordinated Internet Attacks: Responding to Attack Complexity”, Computer Security, Vol.12, pp.165–190.
[16]. Shah.K, Dave N, Chavan S, Mukherjee S, Abraham A, Sanyal S, (2004). “Adaptive Neuro-fuzzy Intrusion Detection System”, IEEE International Conference on ITCC'04, Vol.1, pp.70–74.
[17] . Wang. W, Gombault S, Guyet T, (2008). ”Towards Fast Detecting Intrusions: Using Key Attributes of Network rd Traffic,” The 3 International Conference on Internet Monitoring and Protection, IEEE Press, New York, pp.86–91.
18]. Wang. J, (2007). “Internet Worm Early Detection and Response Mechanism,” The Journal of China Universities of Posts and Telecommunications, Vol.14(3).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.