Saudi M.M.Taib B.M.2024-05-292024-05-29201597833200000001876110010.1007/978-3-319-07674-4_662-s2.0-84915745451https://www.scopus.com/inward/record.uri?eid=2-s2.0-84915745451&doi=10.1007%2f978-3-319-07674-4_66&partnerID=40&md5=ae5b58a02f0335cdff6c02837f9b6ff9https://oarep.usim.edu.my/handle/123456789/9659Nowadays, worms are becoming more sophisticated, intelligent and hard to be detected and responded than before and it becomes as one of the main issues in cyber security. It caused loss millions of money and productivities in many organizations and users all over the world. Currently, there are many works related with worm detection techniques but not much research is focusing on worm response. Therefore, in this research paper, a new model to respond to the worms attack efficiently is built. This worm response model is called as eZSiber, inspired by apoptosis or also known as cell-programmed death. It is a concept borrowed from human immunology system (HIS), where it has been mapped into network security environment. Once the user�s computer detects any indication of the worm attacks, the apoptosis is triggered. In order to trigger the apoptosis, security metrics plays a very important role in identifying the weight and the severity of the worm attacks. In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. This performance criteria result indicated that this model is an efficient worm response model. � Springer International Publishing Switzerland 2015.en-USApoptosisDynamic analysisSecurity metricsSequential minimal optimization (SMO)Static analysisWorm responseArtificial intelligenceCell deathDynamic analysisLearning algorithmsLearning systemsOptimizationStatic analysisOverall accuraciesPerformance criterionSecurity environmentsSecurity metricsSequential minimal optimizationSequential minimal optimization algorithmsStatic and dynamic analysisWorm responseNetwork securityDesigning a new model for worm response using security metricsConference Paper707716315