信息安全专业教学资源(讲稿)Malware and Artificial Immune Systems

Malware and Artificial Immune Systems Chris Musselle Bristol Centre for Complexity Sciences(BCCS) University of Bristol Supervised by Dave Cliff and Ayalvadi Ganesh Nottingham University 2010 04/10/2010 Presentation
Malware and Artificial Immune Systems Chris Musselle Bristol Centre for Complexity Sciences (BCCS) University of Bristol Supervised by Dave Cliff and Ayalvadi Ganesh 04/10/2010 Nottingham University 2010 Presentation

Malware Evolution >Pre 1990-Experimental /intellectual pranks.E.g.Morris Worm. >1990-1999-More sophisticated Viruses and Worms e.g Macro virus,encryption,polymorphic viruses. >2000-2003-Explosion of Worms.CodeRed,Nimda,Slammer etc... >2003-present-Increase in malware sophistication,blended threats,countermeasures,updating.e.g.Conficker. >Shift in motive towards financial gain has driven the increased sophistication and prevalence of malware. The Web today provides cyber-criminals with the targets, exploitable weaknesses,and anonymity required for large- scale fraud
Malware Evolution Pre 1990 – Experimental /intellectual pranks. E.g. Morris Worm. 1990-1999 – More sophisticated Viruses and Worms e.g. Macro virus, encryption, polymorphic viruses. 2000-2003 – Explosion of Worms. CodeRed, Nimda, Slammer etc... 2003-present – Increase in malware sophistication, blended threats, countermeasures, updating. e.g. Conficker. Shift in motive towards financial gain has driven the increased sophistication and prevalence of malware. The Web today provides cyber-criminals with the targets, exploitable weaknesses, and anonymity required for largescale fraud

Modern 'Malware'Economy >Cyber-criminals have embraced Web 2.0 technologies,and specialise in various roles. >Tools of the trade are readily available for purchase, with some malware authors even offering technical support and updates to their products. >Basic strategy is to host new malicious sites/ compromise legitimate ones,and then lure victims to them. >Shift towards more stealthy and sophisticated malware e.g.Drive by Downloading,large surge in data theft Trojans malware
Modern ‘Malware’ Economy Cyber-criminals have embraced Web 2.0 technologies, and specialise in various roles. Tools of the trade are readily available for purchase, with some malware authors even offering technical support and updates to their products. Basic strategy is to host new malicious sites / compromise legitimate ones, and then lure victims to them. Shift towards more stealthy and sophisticated malware e.g. Drive by Downloading, large surge in data theft Trojans malware

PhD Focus >Anomaly detection techniques to better distinguish between normal and potentially malicious behaviour within a computer system. >Avenues of investigation Artificial Immune Systems 。Machine Learning Statistical Techniques
PhD Focus Anomaly detection techniques to better distinguish between normal and potentially malicious behaviour within a computer system. Avenues of investigation • Artificial Immune Systems • Machine Learning • Statistical Techniques

The Dendritic Cell Algorithm(DCA) >An abstract model of Dendritic Cell behaviour based on the paradigm of Danger Theory. >Aims to perform anomaly detection by correlating a series of informative signals with a sequence of abstract events(termed 'antigens'). >Signals>Multiple time series set to give approximations of normal or anomalous aggregate behaviour(termed either 'danger'or 'safe'). >Antigens>Symbolic IDs of the individual events. >The goal is to determine which event is most likely responsible for an observed rise in danger signals
The Dendritic Cell Algorithm (DCA) An abstract model of Dendritic Cell behaviour based on the paradigm of Danger Theory. Aims to perform anomaly detection by correlating a series of informative signals with a sequence of abstract events (termed `antigens'). Signals Multiple time series set to give approximations of normal or anomalous aggregate behaviour (termed either `danger' or `safe'). Antigens Symbolic IDs of the individual events. The goal is to determine which event is most likely responsible for an observed rise in danger signals .

Inputs to the dCA Multiple Time Series Data(Signals) Observable global Behaviour Temporal System Time Correlation AABCBDECSDESCEADGFEDETEABERSE RTBD ABERBJFJK GJUWBGTYOC FGKYBECW Individual events QHD /processes P ODN FRB T OFOTMNFI SODO FM OPF K FPF P UM RJT DKI MG P T F OI NBJ OM P gged Events per Time Interval (Antigens)
System Observable global Behaviour Individual events /processes Multiple Time Series Data (Signals) AABCBDECSDESCEADGFEDETEABERSE RTBD ABERBJFJK GJUWBGTYOC FGKYBECW QHD P ODN FRB T OFOTMNFI SODO FM OPF K FPF P U M RJT DKI MG P T F OI NBJ OM P O J Logged Events per Time Interval (Antigens) Time Temporal Correlation Inputs to the DCA

Some Limitations Signals Raw DCA Output Domain Score Data Antigen Parameters >Reliance on expert knowledge to carry out mapping into the antigen and signal space. >Can lead to the definition of inputs being quite arbitrary,difficult to compare applications. >Trial and error in finding appropriate parameters
Some Limitations Parameters Raw Domain Data DCA Output Score Antigen Signals Reliance on expert knowledge to carry out mapping into the antigen and signal space. Can lead to the definition of inputs being quite arbitrary, difficult to compare applications. Trial and error in finding appropriate parameters

My Approach Signals Model to Generate DCA Output Synthetic Score Data Parameters Antigen Parameters >Generate controllable synthetic data using a model. >Investigate the relationship between inputs,DCA parameters,and algorithm performance. >Focus on the deterministic DCA(dDCA)
My Approach Parameters DCA Output Score Antigen Signals Generate controllable synthetic data using a model. Investigate the relationship between inputs, DCA parameters, and algorithm performance. Focus on the deterministic DCA (dDCA). Model to Generate Synthetic Data Parameters

Signal Time Series 100 80 60 40 20 950 375 400 425 450 Timestep Errors in classification occurred at boundaries
Errors in classification occurred at boundaries

Phase 1:Formation of Phase 2:Input Processing Phase 3:Final Classification Inputs to DCA by DC Population Weights for Time Windows calculating CSM and K Threshold based Signal Signal calculation Segmentation by Mapping Processing ·Fuzzy set Theory ABS or TBS calculation Techniques used: ·No.of DCs Raw ·Simple stats ·Migration Population DC Metric PCA Threshold Domain n-gram analysis Distribution Analysis outputs Calculation Data Information Theory Expert Knowledge ·Reassign same migration threshold ·MCAV ·MAC ·Assign new Antigen Antigen threshold randomly ·K Alpha Mapping Sampling Randomly drawn from a pool of Antigen Multiplier antigen Allocated in Round Robin fashion
Phase 1: Formation of Inputs to DCA Phase 2: Input Processing by DC Population Phase 3: Final Classification • MCAV • MAC • K Alpha • Threshold based calculation • Fuzzy set Theory calculation • Randomly drawn from a pool of antigen • Allocated in Round Robin fashion • No. of DCs • Migration Threshold Distribution Techniques used: • Simple stats • PCA • n-gram analysis • Information Theory • Expert Knowledge Time Windows Antigen Multiplier Segmentation by ABS or TBS Weights for calculating CSM and K • Reassign same migration threshold • Assign new threshold randomly Signal Processing Signal Mapping Population Analysis Antigen Mapping Raw Domain Data Antigen Sampling DC outputs Metric Calculation
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 安徽理工大学:信息安全专业教学资源(讲稿)信息安全专业介绍 An Introduction to Specialty in Information.ppt
- 安徽理工大学:信息安全专业教学资源(讲稿)信息安全学科综述 An Overview of Information Security.ppt
- 信息安全专业教学资源(讲稿)An Introduction to Artificial Immune Systems(ES2001).ppt
- 安徽理工大学:信息安全专业教学资源(讲稿)Differential Privacy.pdf
- 信息安全专业教学资源(讲稿)Introduction to Artificial Immune Systems(AIS).ppt
- 信息安全专业教学资源(讲稿)Artificial Immune Systems——An Emerging Technology.ppt
- 安徽理工大学:信息安全专业教学资源(讲稿)Bot、Botnet及其检测技术.pdf
- 安徽理工大学:信息安全专业教学资源(讲稿)Advance in Intrusion Detection Techniques.ppt
- 信息安全专业参考书籍:《Mathematics for Computer Science》计算机科学数学(revised Monday 5th June, 2017,Eric Lehman、F Thomson Leighton、Albert R Meyer).pdf
- 安徽理工大学:信息安全专业教学资源(讲稿)学科前沿讲座之一.pptx
- 安徽理工大学:《Linux开发基础 Development Foundation on Linux OS》课程教学资源(PPT课件讲稿)Section 4 Perl编程(附Perl源代码).ppt
- 安徽理工大学:《Linux开发基础 Development Foundation on Linux OS》课程教学资源(PPT课件讲稿)Section 4 Perl programming.ppt
- 清华大学出版社:《GNU/Linux编程指南》参考书籍【美】K. Wall,M. Watson, M. Whitis(共39章).pdf
- 安徽理工大学:《Linux开发基础 Development Foundation on Linux OS》课程教学资源(PPT课件讲稿)Section 2、3 GNU C/C++编程(CGI programming in GNU C/C++ language).ppt
- 安徽理工大学:《Linux开发基础 Development Foundation on Linux OS》课程教学资源(PPT课件讲稿)Section 1 Shell编程 Shell programming on Linux OS.ppt
- 清华大学出版社:《智能技术》课程教学资源(PPT课件讲稿)第8章 机器学习 machine learning.ppt
- 清华大学出版社:《智能技术》课程教学资源(PPT课件讲稿)第4章 模糊逻辑技术 fuzzy logic(编著:曹承志).ppt
- 清华大学出版社:《智能技术》课程教学资源(PPT课件讲稿)第6章 遗传算法(genetic algorithms,GA).ppt
- 安徽理工大学:《计算机安全与密码学 Computer Security and Cryptography》课程教学资源(课件讲稿)密钥管技术理 Key Management.pdf
- 哈尔滨工程大学:《计算机安全与密码学 Computer Security and Cryptography》课程教学资源(课件讲稿)数字签名技术 Digital Signature.pdf
- Computational Intelligence(Concepts to Implementations)Part 1.pdf
- 安徽理工大学:《数据结构》课程教学资源(2016计算机网络课程设计任务书).doc
- 安徽理工大学:《数据结构》课程教学资源(2018计算机专业实习设计任务书).docx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第1章 绪论(主讲:孙克雷).pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第2章 线性表.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第3章 栈和队列.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第4章 串.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第5章 数组和广义表.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第6章 树和二叉树.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第7章 图.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第9章 查找.pptx
- 安徽理工大学:《数据结构》课程教学资源(PPT课件讲稿,C语言版,2018)第10章 排序.pptx
- 安徽理工大学:《数据结构》课程教学资源(课件讲稿,C语言版)第1章 绪论(主讲:孙克雷).pdf
- 安徽理工大学:《数据结构》课程教学资源(课件讲稿,C语言版)第2章 线性表.pdf
- 安徽理工大学:《数据结构》课程教学资源(课件讲稿,C语言版)第3章 栈和队列.pdf
- 安徽理工大学:《数据结构》课程教学资源(课件讲稿,C语言版)第4章 串.pdf
- 安徽理工大学:《数据结构》课程教学资源(课件讲稿,C语言版)第5章 数组和广义表.pdf
- 安徽理工大学:《数据结构》课程教学资源(课件讲稿,C语言版)第6章 树和二叉树.pdf
- 烟台理工学院:《程序设计基础》课程教学资源(Python程序设计理论课教学大纲)Python Programming.docx
- 烟台理工学院:《程序设计基础》课程教学资源(Python课程设计教学大纲)Course Design of Python.doc