z-logo
open-access-imgOpen Access
Research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines
Author(s) -
Li Peng,
Wang Ruchuan
Publication year - 2015
Publication title -
chinese journal of electronics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.267
H-Index - 25
eISSN - 2075-5597
pISSN - 1022-4653
DOI - 10.1049/cje.2015.01.030
Subject(s) - computer science , malware , code (set theory) , support vector machine , immune system , immunization , source code , artificial intelligence , machine learning , computer security , operating system , programming language , set (abstract data type) , immunology , biology
The malicious computer code immune system and the biological immune system are highly similar: both preserve the stability of the system in real time in a constantly changing environment. This similarity is exploited to design a malicious code immune system to solve the malware active defense problem. The malicious code immunization project is mainly composed of four major components: the immune information collection program, immune information filtering processing program, immunization information discrimination program, and immune response program. An imbalanced support vector machine method was applied to optimize output results of malicious code immunization, thereby removing uncertain malicious code immune outputs. This demonstrates in detail the feasibility of the imbalanced support vector machine method in optimizing the immunization program output data. We showed that an imbalanced support vector machines canoptimize the outputs of the malicious code immune system by removing glitches from the outputs. As a result, the machine helps to determine the precise time of the emergence of the immune response.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here