Research Article

Hybrid model for Computer Viruses: an Approach towards Ideal Behavior

by  Ankur Singh Bist
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Issue 17
Published: May 2012
Authors: Ankur Singh Bist
10.5120/7001-9509
PDF

Ankur Singh Bist . Hybrid model for Computer Viruses: an Approach towards Ideal Behavior. International Journal of Computer Applications. 45, 17 (May 2012), 16-19. DOI=10.5120/7001-9509

                        @article{ 10.5120/7001-9509,
                        author  = { Ankur Singh Bist },
                        title   = { Hybrid model for Computer Viruses: an Approach towards Ideal Behavior },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 45 },
                        number  = { 17 },
                        pages   = { 16-19 },
                        doi     = { 10.5120/7001-9509 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Ankur Singh Bist
                        %T Hybrid model for Computer Viruses: an Approach towards Ideal Behavior%T 
                        %J International Journal of Computer Applications
                        %V 45
                        %N 17
                        %P 16-19
                        %R 10.5120/7001-9509
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer viruses are big threat for our society . The expansion of various new viruses of varying forms make the prevention quite tuff . Here we proposed an ideal hybrid model to prevent from computer viruses. The proposed model try to produce the environment for static and nature changing viruses.

References
  • F. Cohen. Viruses . PhD. Thesis, university of southern California 1985.
  • Vb," ibm viruses(update)",virus vol. no. 1999,pp. 5-6.
  • Szor,p. ,the art of computer viruses research and defense ,adison –Wesley ,professional,2005.
  • Erdogan,o. and p. cao, "hash-av:fastvirus signature scanning by cache –resident filters", in ieee global telecommunication conference.
  • Szor, P. and P. Ferrie, "Hunting for Metamorphic", in 11th
  • Virus Bulletin International Conference, 2001, pp. 123-144.
  • Catalin,b. and A. vi oiu,"optimiozation of antivirus"
  • Bidgali,h. , handbook of information security ,wiley 2006.
  • Jordan, M. , "Dealing with Metamorphism", Virus Bulletin, October 2002, pp. 4-6
  • Aycock , j. computer viruses and malware, ab,Canada:springer,2006.
  • Veldman, F. , "Generic Decryptors Emulators of the future", in IVPC conference, 1998.
  • S. forest,S. hofmeyr,A. Somayaji, and t. longstaff,"A sense of self for Unix procesess". in IEEE symposium on security andprivacy. 1996.
  • D. Wanger ,and d. dean . intrusion detection via static analysis". In IEEE symposium on security and privacy. 2001.
  • Madihah mohd Saudi shaharudin Ismail "an efficient control of virus propagation"
  • Christina Carrick and Qiang Yang(Simon Fraser University Burnaby, BC, Canada, V5A 1S6) , Irene Abi-Zeid and Luc Lamontagne(Defense Research Establishment Valcartier Decision Support Technology 2459, boul. Pie XI, nord Val Belair, Quebec, Canada, G3J 1X5),'' Activating CBR Systems through Autonomous'', Springer-Verlag Berlin Heidelberg 1999 .
  • Magda liliana RUIZ ORDONEZ (Girona university),'' Multivariate statistical process control and case-based reasoning for situation assessment of sequencing barch reactors'',ISBN:978-84-691-6833-2,Dipositlegal:GI-1299-2008.
  • M. siddiqui,M. C Wang and J. Lee data mining methods for malware detection using intrusion techniques in proceedings of artificial intelligence,2008.
  • J. O Kephart ,"a biologically inspired immune for computers", proceedings on conference synthesis and simulation of living system,1994,pp. 985-996.
  • M. fredrikson and s. jha,R. sailer,X. yan. "Synthesis near optimal malware specification from suspicious behavior". 2010,pp. 45-60.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Polymorphic False Negative false Positive Hybrid

Powered by PhDFocusTM