Publication:
Designing a new model for worm response using security metrics

No Thumbnail Available

Date

2015

Journal Title

Journal ISSN

Volume Title

Publisher

Springer Verlag

Research Projects

Organizational Units

Journal Issue

Abstract

Nowadays, worms are becoming more sophisticated, intelligent and hard to be detected and responded than before and it becomes as one of the main issues in cyber security. It caused loss millions of money and productivities in many organizations and users all over the world. Currently, there are many works related with worm detection techniques but not much research is focusing on worm response. Therefore, in this research paper, a new model to respond to the worms attack efficiently is built. This worm response model is called as eZSiber, inspired by apoptosis or also known as cell-programmed death. It is a concept borrowed from human immunology system (HIS), where it has been mapped into network security environment. Once the user�s computer detects any indication of the worm attacks, the apoptosis is triggered. In order to trigger the apoptosis, security metrics plays a very important role in identifying the weight and the severity of the worm attacks. In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. This performance criteria result indicated that this model is an efficient worm response model. � Springer International Publishing Switzerland 2015.

Description

Keywords

Apoptosis, Dynamic analysis, Security metrics, Sequential minimal optimization (SMO), Static analysis, Worm response, Artificial intelligence, Cell death, Dynamic analysis, Learning algorithms, Learning systems, Optimization, Static analysis, Overall accuracies, Performance criterion, Security environments, Security metrics, Sequential minimal optimization, Sequential minimal optimization algorithms, Static and dynamic analysis, Worm response, Network security

Citation

Collections