DESIGN OF A NEURAL-NETWORK FOR RECOGNITION AND CLASSIFICATION OF COMPUTER VIRUSES

被引:10
作者
DOUMAS, A [1 ]
MAVROUDAKIS, K [1 ]
GRITZALIS, D [1 ]
KATSIKAS, S [1 ]
机构
[1] INST EDUC TECHNOL,DEPT INFORMAT,GR-12210 ATHENS,GREECE
关键词
COMPUTER SECURITY; INFORMATION SYSTEMS SECURITY; COMPUTER VIRUS; WORM; NEURAL NETWORK; INTRUSION DETECTION; VIRUS RECOGNITION; VIRUS CLASSIFICATION;
D O I
10.1016/0167-4048(95)00008-V
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A sufficient number of experiments has been conducted to ascertain that a neural network can be used as a component of a computer security system for the recognition and classification of computer virus attack A set of attributes that describe the system activity and the behaviour of computer viruses has been identified. The error back propagation training algorithm and the self-organizing feature map have been studied. Several experiments were conducted using both algorithms, different learning parameters, and two different training sets. For each architecture, the size of the network with the best performance was estimated experimentally. Results indicate that both neural networks can discriminate input patterns, at almost the same level of accuracy. The number of neurons required for the solution of the specific problem using a multilayer perceptron network was smaller than the respective number for a self-organizing feature map network Therefore, using back propagation, the training and the recall process were faster. In conclusion, neural networks were proved to be efficient and practical devices for computer virus recognition and classification, in certain environments.
引用
收藏
页码:435 / 448
页数:14
相关论文
共 35 条
[1]  
[Anonymous], 1991, INTRO THEORY NEURAL, DOI DOI 10.1201/9780429499661
[2]  
[Anonymous], 1992, NEURAL NETWORKS FUZZ
[3]  
Audit Commission for Local Authorities and the National Health Service in England and Wales, 1994, OPPORTUNITY MAKES TH
[4]  
BRUNNSTEIN K, 1992, COMPUTER VIRU CATALO
[5]  
BRUNNSTEIN K, 1991, CONCEPTS EXPERT SYST
[6]   EXPERIMENTS ON NEURAL NET RECOGNITION OF SPOKEN AND WRITTEN TEXT [J].
BURR, DJ .
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1988, 36 (07) :1162-1168
[7]  
DENNING D, 1987, SRI INT AUG
[8]  
DENNING D, 1986, 1986 P IEEE S SEC PR, P118
[9]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[10]  
DENNING DE, 1985, SRI INT AUG