SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
DOI : 10.5121/ijfls.2013.3205 63
SOFT-COMPUTING VIRUS
IDENTIFICATION SYSTEM
*Obi J.C1
and Okpor D.M2
Department of Computer Science, University of Benin, Benin City. Nigeria1
.
Department of Computer Science, Delta State, Polytechnic, Ozoro2
tripplejo2k2@yahoo.com1
&magaretokpor20@yahoo.com2
ABSTRACT
Virus is one of the world’s deadliest malicious software. One of the known attribute of
virus is the ability of reproducing itself and spreading from host to host. Several
approaches in recognizing virus has not been completely objective in nature. In other to
achieve this, developing a soft-computing system will help bring precision, learning
ability and optimal solution which is the focal point of this research.
KEYWORDS:
Virus, fuzzy-logic, genetic Algorithm, Neural Network
1.0 INTRODUCTION
A computer virus is an executable computer program that can replicate itself and spread from one
computer to another. The term "virus" is also commonly, but erroneously, used to refer to other
types of malware, including but not limited to adware and spyware programs that do not have a
reproductive ability (Hkust, 2002 and Wikipedia, 2013). Virus usually reside on a computer
program disrupting computer activities without replicating itself while a computer worm must
replicate itself consuming computer resources such as memory space and cpu processing time.
Examples of computer virus are malware, worms, and key-loggers etc. The majority of active
malware threats are usually trojans or worms rather than viruses (Hkust, 2002). Malware such as
Trojan horses and worms is sometimes confused with viruses, which are technically different: a
worm can exploit security vulnerabilities to spread itself automatically to other computers
through networks, while a trojan-horse is a program that appears harmless but hides malicious
functions. Worms and trojan-horses, like viruses, may harm a computer system's data or
performance. The criteria for identifying a virus are usually noticeable through abnormal system
behaviors (Hkust, 2012).
Virus can cause considerable harm and damage to a computer system, which could affect the hard
disk, the main operating system and other software relevant to system functionalities. Virus can
be prevented by strong anti-virus and regular update to harness the recent patches to prevent
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
64
exploitation of system vulnerabilities. There are many types of computer viruseswhich include
(Hkust, 2002):
a. File virus: Virus which attaches itself to program file (executable file) is known as file
virus).
b. Boot sector virus: Virus which affects system sector is known as boot virus. These system
sectors includes hard-disk, floppy disk etc).
c. Macro Virus: Virus writtenuses a language built into a particular application
d. Virus Hoax: A virus in the form of a compulsory non-existent message intended in
bending the user to carry a particular.
A complete soft-computing system for the recognition of computer virus utilizing genetic
algorithm, fuzzy logic and neural network drives this research hunt. Genetic algorithm will help
optimize the fuzzy set to arrive at a floor or roof value representing the clusters of the
membership function. The parameters for identifying computer virus are usually vague therefore
the adoption of fuzzy to set a boundary case while neural network provide the self-learning ability
(Hkust, 2002).
2.0 REVIEW OF RELATED LITERATURES
The research work of (Nitesh et al., 2012) provides a general overview on computer viruses and
defensive techniques. They focused on reviewing the techniques utilized by anti-virus experts
design in and develop new antivirus (Babak et al., 2011) which was utilized in proposing their
own work.
The research work on the regulation of virus by (Mathias, 2003) took a critical look phenomena
of computer virus computer virus helping legislator both locally and internationally prohibit it
spread and influence. It also exploits the alternative use of virus for which a legislator should be
aware of when processing the legal status of computer code.
The criteria’s/parameters for recognizing and identifying virus are (Arnold, 2012)
a. Decline system speed: The speed of most system is closely linked with virus infection or
not. Most system infected with virus usually run slower disrupting relevant daily operation.
If the user disconnects from the internet and the system performs improve tremendously
and perform decline gradually while connected to the internet, it is a sure sign of virus
infection.
b. Numerous system errors: When a user experiences strange errors or just more errors that
disrupt daily operation such asclose your programs or causing the user to restart your
computer, there is a high possibility of virus infection. Sometimes errors are normal, but
constant occurrence is problematic. By keeping a log of errors experiences, when it
occurred and the severity can help mitigate the issues.
c. Persistent Logoff: when the computer system continuously and persistently logoff without
the user initiating it indicates the present of virus.
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
65
d. Disable security software: When updated anti-virus software, firewall or window updates
has been change or disabled not by the user, virus is sequentially at work. Lack of updated
anti-virus, open the way for to exploit system vulnerabilities.
e. Abnormal Internet system Behaviors: The abnormal behavior of system when connected
to the Internet is another sign of virus infection. Virus is malicious codes therefore,
compromising sensitive document are usually one of their main purpose but this is only
possible when online.
f. Obvious desktop changes: Desktop icons are the small graphics on most computers
desktop. Under normal circumstances, a desktop icon only appears when a piece of
software is loaded, ask the program to load an icon, or when it is dragged from the icon of a
program list and drop it to on the desktop. The present of virus introduce desktop icons that
were not requested for.
g. Continuous Hard Drive noise: The retrieval of information from the system hard disk,
disk drive and external hard disk is usually accompanied by a slow processing noise which
is normal for any performing system. The continuous performs of this noise with or without
computer operation highlights computer virus infection.
Zadeh introduced fuzzy logic from which fuzzy set steams out as a means of handling
imprecision in real work data (Zadeh, 1965). Crisp values which propagate true or false values,
yes or no, and 0 or 1. Fuzzy provides ranges of values streaming from 0.00 through 1.00 Fuzzy
sets provide a means of representing and manipulating data that are not precise, but rather fuzzy
(Cengiz et al., 2007). Fuzzy logic is a superset of conventional (Boolean) logic that has been
extended to handle the concept of partial truth - truth values between "completely true" and
"completely false"(Abdelnassir, 2005; Kasabov, 1998; Robert, 1995; Christos and Dimitros,
2008, Leondes, 2010). Fuzzy logic works closely with neural network because they provide the
rules necessary for neural net trainer to adapt to in carrying out a particular action. They also
learn for close observations.
Integrated neurons form a neural net (Simon, 1999). This neuron is program construct mimicking
the biological parallel working of the human brain. There are different type of neural work such
supervised learning, unsupervised and reinforced learning rolling along several topology such as
feed-forward, feedback, adaptive resonant theory kohen self-organizing and counter-propagation.
The internal and external information flowing through the network results in continuous system
refinement leading optimal system results.
Genetic Algorithm is a search and optimization techniques made up of four main components
which include:
a. The fitness function, also called evaluation function, is the genetic algorithm component
that rates potential solution by calculating how good they are relative to the current
problem domain (Christian and Gustav 2003).
b. Selection enhances the movement of string of bit toward optimal genetic search space.
The individual bit is cross with other individual bit aim order to arrive at our optimal
fitness function.A lower selection pressure is recommended in the start of the genetic
search; while a higher selection pressure is recommended at the end in order to narrow
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
66
c. Mutation operator changes one or more gene values in a chromosome. Mutation means
taking, one or more random chromosomes from the DNA string and changing it (for
example, 0 become 1 and vice versa).
d. Crossover, involves exchanging chromosome portions of genetic material. The result is
that a large variety of genetic combinations will be produced. In other words, crossover
takes two of the fittest genetic strings in a population and combines the two of them to
generate new genetic string (Christian and Gustav 2003).
3.0 MATERIAL METHOD, RESULT AND DISCUSSION
Seven (7) basic and major parameters were utilized in achieving our soft computing virus
identification system; these are presented in Table 1.
Table 1: Parameters for Virus Identification
Code Parameters
P01 Decline system speed
P02 Numerous system errors
P03 Persistent logoff
P04 Disable security software
P05 Abnormal Internet system behaviors
P06 Obvious desktop changes
P07 Continuous Hard Drive noise
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
67
OUTPUT
The fuzzy partition for each input feature consists of the parameters of virus
identification. The rules that can be generated from the initial fuzzy partitions of the
classification of are thus
Knowledge-base
Database Engine
Neural Network
Fuzzy Logic
Decline system speed, numerous
system errors, persistent logoff,
Disable security software, abnormal
Internet system behaviors, obvious
desktop changes, and Continuous
Hard Drive noise
Structured
information
Unstructured
information
Genetic
Optimization
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
68
a. Virus Infected System (Class: C1)
b. Moderately Secured system (Class: C2)
c. Secured System (Class: C3)
If the system is exhibiting less than or equal to two (2) of the parameters of virus
detection THEN (C1), if the system is exhibiting three (3) of the parameters of virus
identification THEN (C2) and if the system is exhibiting four (4) or more parameters of
virus identification THEN (C3)
The Fuzzy IF-THEN Rules (Ri) for Virus identification is thus:
R1: IF the system is exhibiting any of the parameters for virus identification such as
decline system speed THEN it is in class C1.
R2: IF the system is exhibiting two of the parameters for virus identification such as
decline system speed and numerous stem errors THEN it is in class C1.
R3: IF the system is exhibiting three of the parameters for virus identification such as
decline system speed, numerous stem errors and persistent logoff THEN it is in
class C2.
R4: IF the system is exhibiting four of the parameters for virus identification such as
decline system speed, numerous stem errors, persistent logoff and disable security
software THEN it is in class C3.
R5: IF the system is exhibiting five of the parameters for virus identification such as
decline system speed, numerous stem errors, persistent logoff, disable security
software and obvious desktop change THEN it is in class C3.
R6: IF the system is exhibiting six of the parameters for virus identification such as
decline system speed, numerous stem errors, persistent logoff, disable security
software, obvious desktop change and abnormal internet system behaviors THEN
it is in class C3.
R7: IF the system is exhibiting seven of the parameters for virus identification such as
decline system speed, numerous stem errors, persistent logoff, disable security
software, obvious desktop change, abnormal internet system behaviors and
continuous hard change THEN it is in class C3.
A typical data set that contains the seven parameters is presented in Table 2. This shows
the degree of intensity (membership) of virus identification.
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
69
Table 2:Data Set showing the Degree of membership of virus identification
The Genetic algorithm utilizes the following conditions to determine when to stop: Generations
or Fitness limit. In this case, we used the number of generation (4th
generation) to determine the
stopping criterion.
Genetic Algorithm Inference:
R1: IF R01 THEN C1 = 0.50
R2: IF R01 AND R02 THEN C2 = 0.18
R3: IF R01, R02 AND R03 THEN C2 = 0.38
R4: IF R01, R02, R03 AND R04 THEN C3 = 0.44
R5: IF R01, R02, R03, R04 AND R05 THEN C3 = 0.37
R6: IF R01, R02, R03, R04, R05 AND R06 THEN C3 = 0.46
R7: IF R01, R02, R03, R04, R05, R06 AND RO7 THEN C3 = 0.46
We then convert these resolved values into whole numbers and imply them to be the
fitness function (f) of the initial generation (Parents)
R1: 50, R2: 18, R3: 38 R4: 44 R5: 37 R6: 46
R7: 46
Parameters Or Fuzzy Sets
Of virus identification
Codes Degree of Membership
Cluster 1
(C1)
Cluster 2
(C2)
Cluster 3
(C3)
Decline system speed R01 0.50 0.15 0.35
Numerous stem errors R02 0.20 0.20 0.60
Persistent logoff R03 0.10 0.80 0.10
Disable security software R04 0.20 0.10 0.70
Obvious desktop change R05 0.30 0.60 0.10
Abnormal internet system behaviors R06 0.05 0.05 0.90
Continuous hard change R07 0.00 0.50 0.50
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
70
S/N Selection Chromosomes (Binary; 0 or 1) Fitness
function
Parent (1st
Gen) Crossover Parent (2nd
Gen)
1 50 110010 1 & 6 110101 53
2 46 101110 2 & 4 101100 44
3 46 101110 Mutation 101100 44
4 44 101100 2 & 4 101110 46
5 38 100110 5 & 7 100010 34
6 37 100101 1 & 6 100010 34
7 18 010010 5 & 7 010110 22
Table 3: 1st
and 2nd
Generation Table
Table 4: 2nd
and 3rd
Generation Table
Table 5: 3rd
and 4th
Generation Table
To create our 2nd
and 3rd
generation from the parents (1st
generation) we chose the third bit from
the left to be our crossover point. In the 4th
generation each bold bit signifies the cross-over bits, a
S/N Selection Chromosomes (Binary; 0 or 1) Fitness
functionParent (2nd
Gen) Crossover Parent (3rd
Gen)
1 53 110101 1 & 3 110100 52
2 46 101110 2 & 6 101010 42
3 44 101100 1 & 3 101101 45
4 44 101100 4 & 5 101010 42
5 34 100010 4 & 5 100100 36
6 34 100010 2 & 6 100110 38
7 22 010110 Mutation 010100 20
S/N Selection Chromosomes (Binary; 0 or 1) Fitness
functionParent (3rd
Gen) Crossover Parent (4th
Gen)
1 52 110100 Mutation 110110 54
2 45 101101 2 & 3 101110 46
3 42 101010 2 & 3 101001 41
4 42 101010 6 & 4 101000 40
5 38 100110 5 & 7 100100 40
6 36 100100 6 & 4 100110 38
7 20 010100 5 & 7 010110 22
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
71
single bold bit signifies mutation of that bit and an italicized chromosomes signifies elitism. The
best fourth generation (stopping criterion) is that with the best fitness function, 54. This implies
that the clusters of the various parameters has been searched and optimized to 0.54. Therefore
combination of parameters which produce a membership function < 0.54 = C1, 0.54 = C2 and ≥
0.54 = C3 as presented in Figure 4.
Table 6: Data Set showing the Degree of membership of Operating System Process
4.0 CONCLUSION
A complete soft-computing client-side system for the identification of virus has been developed.
The developed system will indicate the recent state of a user system based on the aforementioned
parameters for the recognition of virus. Full Implementation of such system will go a long way in
curbing the spread of virus on computer systems.
REFERENCE
[1] AbdelnassirA. (2005), “Torque Ripple Minimization in Direct Torque Control of Induction
Machines” A Thesis Presented to The Graduate Faculty of the University of Akron In Partial
Fulfillment of the Requirements for the Degree Master of Science, retrieved online from
http://etd.ohiolink.edu/send-pdf.cgi/Abdalla%2520Abdelnassir.pdf?akron1116121267
[2] Arnold A. (2012), “Computer Virus Symptom List”, retrieved online from
http://www.ehow.com/list_6594924_computer-virus-symptomlist.html#ixzz2Mrmvxn6o.
Parameters Or Fuzzy Sets
Of Operating System Process
Codes Degree of Membership
Cluster 1
(C1)
Cluster 2
(C2)
Cluster 3
(C3)
Decline system speed R01 0.50 0.15 0.35
Numerous stem errors R02 0.20 0.20 0.60
Persistent logoff R03 0.10 0.80 0.10
Disable security software R04 0.20 0.10 0.70
Obvious desktop change R05 0.30 0.60 0.10
Abnormal internet system behaviors R06 0.05 0.05 0.90
Continuous hard change R07 0.00 0.50 0.50
Result Virus
Infected
System
Moderatel
y Secured
System
Secure
System
International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013
72
[3] BabakB. R.., Maslin M. and Suhaimi I. (2011), “Evolution of Computer Virus Concealment and Anti-
Virus Techniques: A Short Survey”,International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 1, pp.
113-121.
[4] Cengiz K., Sezi C., Nufer Y.A. and Murat G. (2007), “Fuzzy multi-criteria evaluation of industrial
robotic systems” , Computers & Industrial Engineering, Vol. 52, Issue 4, Pages 414–433.
[5] Christian J. and Gustav E. (2003), “Optimizing Genetic Algorithms for Time Critical
Problems”,Department of Software Engineering and Computer Sciencelekinge Institute of
Technology Box 520 SE ä 372 25 Ronneby Sweden.
[6] Christos S. and Dimitros S. (2008) “Neural Network”, retrieved from
http://www.docstoc.com/docs/15050/neural-networks.
[7] Larry A. (2013), “How to Identify Computer Virus Symptoms” retrieved online from
http://www.ehow.com/how_4903119_identify-computer-virus-symptoms.html#ixzz2Mr
[8] Hkust,(2002), Types of Virus”, retrieved online from
http://www.ust.hk/itsc/antivirus/general/types.html
[9] Kasabov N. K. (1998), “Foundations of neural networks, fuzzy systems, and knowledge
engineering”, A Bradford Book, The MIT Press Cambridge, Massachusetts London, England, ISBN
0-262-11212-4.
[10] Leondes C (2010), “The Technology of Fuzzy Logic Algorithm retrieved from
Suite101.com/examples-of-expert-System-application-in-artificial Intelligence.
[11] Mathias K. (2003), “A Critical Look at the regulations of Computer Viruses”, International Journal
of Law and Information technology, Retrieved online from http://www.digital-rights.net/wp-
content/uploads/2008/01/klang_virus_ijlit.pdf.
[12] Nitesh K. D., Lokesh m., Mahendra S. C. and Bhabesh K. D., (2012), “The New Age
OfComputer Virus And Their Detection”, International Journal of Network Security & Its
Applications (IJNSA), Vol.4, No.3, retrieved on from http://airccse.org/journal/jnsa12_current.html
[13] Robert F. (1995), “Neural Fuzzy Systems”retrieved online from
http://faculty.petra.ac.id/resmana/basiclab/fuzzy/fuzzy_book.pdf.
[14] Simon S.H. (1999), “Neural Network: A comprehensive Foundation, Pretice Hall, Chapter 1-15, Pp.
1-889)
[15] Tom B. (2002), “Retail Market Basket Analysis: A Quantitative Modelling Approach” Dissertation
submitted to obtain the degree of Doctor in Applied Economic Sciences at the Limburg University
Center.
[16] Wikipedia (2013), “Computer virus” retrieved online from en.wikipedia.org/wiki/
[17] Zadeh L. A. (1965), “Fuzzy sets, Information and Control”, Vol.8, pp.338-353.

More Related Content

What's hot

Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Virus detection system
Virus detection systemVirus detection system
Virus detection systemAkshay Surve
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Networkijircee
 
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicModeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicIOSR Journals
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET Journal
 
Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2IAEME Publication
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Kent State University
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 

What's hot (19)

Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Ijetr012045
Ijetr012045Ijetr012045
Ijetr012045
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Layered approach
Layered approachLayered approach
Layered approach
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicModeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Antivirus
AntivirusAntivirus
Antivirus
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
50120140506001
5012014050600150120140506001
50120140506001
 

Similar to Ijfls05

Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware IOSR Journals
 
An approach to containing computer viruses
An approach to containing computer virusesAn approach to containing computer viruses
An approach to containing computer virusesUltraUploader
 
A distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemA distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemUltraUploader
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attackUltraUploader
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...IJNSA Journal
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemAlexander Decker
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detectionUltraUploader
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsEditor IJCATR
 
Image Morphing: A Literature Study
Image Morphing: A Literature StudyImage Morphing: A Literature Study
Image Morphing: A Literature StudyEditor IJCATR
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsEditor IJCATR
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docxdrennanmicah
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesSolomon Sunday Oyelere
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 

Similar to Ijfls05 (20)

A0430104
A0430104A0430104
A0430104
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
An approach to containing computer viruses
An approach to containing computer virusesAn approach to containing computer viruses
An approach to containing computer viruses
 
A distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemA distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune system
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
 
Image Morphing: A Literature Study
Image Morphing: A Literature StudyImage Morphing: A Literature Study
Image Morphing: A Literature Study
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Ijfls05

  • 1. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 DOI : 10.5121/ijfls.2013.3205 63 SOFT-COMPUTING VIRUS IDENTIFICATION SYSTEM *Obi J.C1 and Okpor D.M2 Department of Computer Science, University of Benin, Benin City. Nigeria1 . Department of Computer Science, Delta State, Polytechnic, Ozoro2 tripplejo2k2@yahoo.com1 &magaretokpor20@yahoo.com2 ABSTRACT Virus is one of the world’s deadliest malicious software. One of the known attribute of virus is the ability of reproducing itself and spreading from host to host. Several approaches in recognizing virus has not been completely objective in nature. In other to achieve this, developing a soft-computing system will help bring precision, learning ability and optimal solution which is the focal point of this research. KEYWORDS: Virus, fuzzy-logic, genetic Algorithm, Neural Network 1.0 INTRODUCTION A computer virus is an executable computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability (Hkust, 2002 and Wikipedia, 2013). Virus usually reside on a computer program disrupting computer activities without replicating itself while a computer worm must replicate itself consuming computer resources such as memory space and cpu processing time. Examples of computer virus are malware, worms, and key-loggers etc. The majority of active malware threats are usually trojans or worms rather than viruses (Hkust, 2002). Malware such as Trojan horses and worms is sometimes confused with viruses, which are technically different: a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a trojan-horse is a program that appears harmless but hides malicious functions. Worms and trojan-horses, like viruses, may harm a computer system's data or performance. The criteria for identifying a virus are usually noticeable through abnormal system behaviors (Hkust, 2012). Virus can cause considerable harm and damage to a computer system, which could affect the hard disk, the main operating system and other software relevant to system functionalities. Virus can be prevented by strong anti-virus and regular update to harness the recent patches to prevent
  • 2. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 64 exploitation of system vulnerabilities. There are many types of computer viruseswhich include (Hkust, 2002): a. File virus: Virus which attaches itself to program file (executable file) is known as file virus). b. Boot sector virus: Virus which affects system sector is known as boot virus. These system sectors includes hard-disk, floppy disk etc). c. Macro Virus: Virus writtenuses a language built into a particular application d. Virus Hoax: A virus in the form of a compulsory non-existent message intended in bending the user to carry a particular. A complete soft-computing system for the recognition of computer virus utilizing genetic algorithm, fuzzy logic and neural network drives this research hunt. Genetic algorithm will help optimize the fuzzy set to arrive at a floor or roof value representing the clusters of the membership function. The parameters for identifying computer virus are usually vague therefore the adoption of fuzzy to set a boundary case while neural network provide the self-learning ability (Hkust, 2002). 2.0 REVIEW OF RELATED LITERATURES The research work of (Nitesh et al., 2012) provides a general overview on computer viruses and defensive techniques. They focused on reviewing the techniques utilized by anti-virus experts design in and develop new antivirus (Babak et al., 2011) which was utilized in proposing their own work. The research work on the regulation of virus by (Mathias, 2003) took a critical look phenomena of computer virus computer virus helping legislator both locally and internationally prohibit it spread and influence. It also exploits the alternative use of virus for which a legislator should be aware of when processing the legal status of computer code. The criteria’s/parameters for recognizing and identifying virus are (Arnold, 2012) a. Decline system speed: The speed of most system is closely linked with virus infection or not. Most system infected with virus usually run slower disrupting relevant daily operation. If the user disconnects from the internet and the system performs improve tremendously and perform decline gradually while connected to the internet, it is a sure sign of virus infection. b. Numerous system errors: When a user experiences strange errors or just more errors that disrupt daily operation such asclose your programs or causing the user to restart your computer, there is a high possibility of virus infection. Sometimes errors are normal, but constant occurrence is problematic. By keeping a log of errors experiences, when it occurred and the severity can help mitigate the issues. c. Persistent Logoff: when the computer system continuously and persistently logoff without the user initiating it indicates the present of virus.
  • 3. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 65 d. Disable security software: When updated anti-virus software, firewall or window updates has been change or disabled not by the user, virus is sequentially at work. Lack of updated anti-virus, open the way for to exploit system vulnerabilities. e. Abnormal Internet system Behaviors: The abnormal behavior of system when connected to the Internet is another sign of virus infection. Virus is malicious codes therefore, compromising sensitive document are usually one of their main purpose but this is only possible when online. f. Obvious desktop changes: Desktop icons are the small graphics on most computers desktop. Under normal circumstances, a desktop icon only appears when a piece of software is loaded, ask the program to load an icon, or when it is dragged from the icon of a program list and drop it to on the desktop. The present of virus introduce desktop icons that were not requested for. g. Continuous Hard Drive noise: The retrieval of information from the system hard disk, disk drive and external hard disk is usually accompanied by a slow processing noise which is normal for any performing system. The continuous performs of this noise with or without computer operation highlights computer virus infection. Zadeh introduced fuzzy logic from which fuzzy set steams out as a means of handling imprecision in real work data (Zadeh, 1965). Crisp values which propagate true or false values, yes or no, and 0 or 1. Fuzzy provides ranges of values streaming from 0.00 through 1.00 Fuzzy sets provide a means of representing and manipulating data that are not precise, but rather fuzzy (Cengiz et al., 2007). Fuzzy logic is a superset of conventional (Boolean) logic that has been extended to handle the concept of partial truth - truth values between "completely true" and "completely false"(Abdelnassir, 2005; Kasabov, 1998; Robert, 1995; Christos and Dimitros, 2008, Leondes, 2010). Fuzzy logic works closely with neural network because they provide the rules necessary for neural net trainer to adapt to in carrying out a particular action. They also learn for close observations. Integrated neurons form a neural net (Simon, 1999). This neuron is program construct mimicking the biological parallel working of the human brain. There are different type of neural work such supervised learning, unsupervised and reinforced learning rolling along several topology such as feed-forward, feedback, adaptive resonant theory kohen self-organizing and counter-propagation. The internal and external information flowing through the network results in continuous system refinement leading optimal system results. Genetic Algorithm is a search and optimization techniques made up of four main components which include: a. The fitness function, also called evaluation function, is the genetic algorithm component that rates potential solution by calculating how good they are relative to the current problem domain (Christian and Gustav 2003). b. Selection enhances the movement of string of bit toward optimal genetic search space. The individual bit is cross with other individual bit aim order to arrive at our optimal fitness function.A lower selection pressure is recommended in the start of the genetic search; while a higher selection pressure is recommended at the end in order to narrow
  • 4. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 66 c. Mutation operator changes one or more gene values in a chromosome. Mutation means taking, one or more random chromosomes from the DNA string and changing it (for example, 0 become 1 and vice versa). d. Crossover, involves exchanging chromosome portions of genetic material. The result is that a large variety of genetic combinations will be produced. In other words, crossover takes two of the fittest genetic strings in a population and combines the two of them to generate new genetic string (Christian and Gustav 2003). 3.0 MATERIAL METHOD, RESULT AND DISCUSSION Seven (7) basic and major parameters were utilized in achieving our soft computing virus identification system; these are presented in Table 1. Table 1: Parameters for Virus Identification Code Parameters P01 Decline system speed P02 Numerous system errors P03 Persistent logoff P04 Disable security software P05 Abnormal Internet system behaviors P06 Obvious desktop changes P07 Continuous Hard Drive noise
  • 5. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 67 OUTPUT The fuzzy partition for each input feature consists of the parameters of virus identification. The rules that can be generated from the initial fuzzy partitions of the classification of are thus Knowledge-base Database Engine Neural Network Fuzzy Logic Decline system speed, numerous system errors, persistent logoff, Disable security software, abnormal Internet system behaviors, obvious desktop changes, and Continuous Hard Drive noise Structured information Unstructured information Genetic Optimization
  • 6. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 68 a. Virus Infected System (Class: C1) b. Moderately Secured system (Class: C2) c. Secured System (Class: C3) If the system is exhibiting less than or equal to two (2) of the parameters of virus detection THEN (C1), if the system is exhibiting three (3) of the parameters of virus identification THEN (C2) and if the system is exhibiting four (4) or more parameters of virus identification THEN (C3) The Fuzzy IF-THEN Rules (Ri) for Virus identification is thus: R1: IF the system is exhibiting any of the parameters for virus identification such as decline system speed THEN it is in class C1. R2: IF the system is exhibiting two of the parameters for virus identification such as decline system speed and numerous stem errors THEN it is in class C1. R3: IF the system is exhibiting three of the parameters for virus identification such as decline system speed, numerous stem errors and persistent logoff THEN it is in class C2. R4: IF the system is exhibiting four of the parameters for virus identification such as decline system speed, numerous stem errors, persistent logoff and disable security software THEN it is in class C3. R5: IF the system is exhibiting five of the parameters for virus identification such as decline system speed, numerous stem errors, persistent logoff, disable security software and obvious desktop change THEN it is in class C3. R6: IF the system is exhibiting six of the parameters for virus identification such as decline system speed, numerous stem errors, persistent logoff, disable security software, obvious desktop change and abnormal internet system behaviors THEN it is in class C3. R7: IF the system is exhibiting seven of the parameters for virus identification such as decline system speed, numerous stem errors, persistent logoff, disable security software, obvious desktop change, abnormal internet system behaviors and continuous hard change THEN it is in class C3. A typical data set that contains the seven parameters is presented in Table 2. This shows the degree of intensity (membership) of virus identification.
  • 7. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 69 Table 2:Data Set showing the Degree of membership of virus identification The Genetic algorithm utilizes the following conditions to determine when to stop: Generations or Fitness limit. In this case, we used the number of generation (4th generation) to determine the stopping criterion. Genetic Algorithm Inference: R1: IF R01 THEN C1 = 0.50 R2: IF R01 AND R02 THEN C2 = 0.18 R3: IF R01, R02 AND R03 THEN C2 = 0.38 R4: IF R01, R02, R03 AND R04 THEN C3 = 0.44 R5: IF R01, R02, R03, R04 AND R05 THEN C3 = 0.37 R6: IF R01, R02, R03, R04, R05 AND R06 THEN C3 = 0.46 R7: IF R01, R02, R03, R04, R05, R06 AND RO7 THEN C3 = 0.46 We then convert these resolved values into whole numbers and imply them to be the fitness function (f) of the initial generation (Parents) R1: 50, R2: 18, R3: 38 R4: 44 R5: 37 R6: 46 R7: 46 Parameters Or Fuzzy Sets Of virus identification Codes Degree of Membership Cluster 1 (C1) Cluster 2 (C2) Cluster 3 (C3) Decline system speed R01 0.50 0.15 0.35 Numerous stem errors R02 0.20 0.20 0.60 Persistent logoff R03 0.10 0.80 0.10 Disable security software R04 0.20 0.10 0.70 Obvious desktop change R05 0.30 0.60 0.10 Abnormal internet system behaviors R06 0.05 0.05 0.90 Continuous hard change R07 0.00 0.50 0.50
  • 8. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 70 S/N Selection Chromosomes (Binary; 0 or 1) Fitness function Parent (1st Gen) Crossover Parent (2nd Gen) 1 50 110010 1 & 6 110101 53 2 46 101110 2 & 4 101100 44 3 46 101110 Mutation 101100 44 4 44 101100 2 & 4 101110 46 5 38 100110 5 & 7 100010 34 6 37 100101 1 & 6 100010 34 7 18 010010 5 & 7 010110 22 Table 3: 1st and 2nd Generation Table Table 4: 2nd and 3rd Generation Table Table 5: 3rd and 4th Generation Table To create our 2nd and 3rd generation from the parents (1st generation) we chose the third bit from the left to be our crossover point. In the 4th generation each bold bit signifies the cross-over bits, a S/N Selection Chromosomes (Binary; 0 or 1) Fitness functionParent (2nd Gen) Crossover Parent (3rd Gen) 1 53 110101 1 & 3 110100 52 2 46 101110 2 & 6 101010 42 3 44 101100 1 & 3 101101 45 4 44 101100 4 & 5 101010 42 5 34 100010 4 & 5 100100 36 6 34 100010 2 & 6 100110 38 7 22 010110 Mutation 010100 20 S/N Selection Chromosomes (Binary; 0 or 1) Fitness functionParent (3rd Gen) Crossover Parent (4th Gen) 1 52 110100 Mutation 110110 54 2 45 101101 2 & 3 101110 46 3 42 101010 2 & 3 101001 41 4 42 101010 6 & 4 101000 40 5 38 100110 5 & 7 100100 40 6 36 100100 6 & 4 100110 38 7 20 010100 5 & 7 010110 22
  • 9. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 71 single bold bit signifies mutation of that bit and an italicized chromosomes signifies elitism. The best fourth generation (stopping criterion) is that with the best fitness function, 54. This implies that the clusters of the various parameters has been searched and optimized to 0.54. Therefore combination of parameters which produce a membership function < 0.54 = C1, 0.54 = C2 and ≥ 0.54 = C3 as presented in Figure 4. Table 6: Data Set showing the Degree of membership of Operating System Process 4.0 CONCLUSION A complete soft-computing client-side system for the identification of virus has been developed. The developed system will indicate the recent state of a user system based on the aforementioned parameters for the recognition of virus. Full Implementation of such system will go a long way in curbing the spread of virus on computer systems. REFERENCE [1] AbdelnassirA. (2005), “Torque Ripple Minimization in Direct Torque Control of Induction Machines” A Thesis Presented to The Graduate Faculty of the University of Akron In Partial Fulfillment of the Requirements for the Degree Master of Science, retrieved online from http://etd.ohiolink.edu/send-pdf.cgi/Abdalla%2520Abdelnassir.pdf?akron1116121267 [2] Arnold A. (2012), “Computer Virus Symptom List”, retrieved online from http://www.ehow.com/list_6594924_computer-virus-symptomlist.html#ixzz2Mrmvxn6o. Parameters Or Fuzzy Sets Of Operating System Process Codes Degree of Membership Cluster 1 (C1) Cluster 2 (C2) Cluster 3 (C3) Decline system speed R01 0.50 0.15 0.35 Numerous stem errors R02 0.20 0.20 0.60 Persistent logoff R03 0.10 0.80 0.10 Disable security software R04 0.20 0.10 0.70 Obvious desktop change R05 0.30 0.60 0.10 Abnormal internet system behaviors R06 0.05 0.05 0.90 Continuous hard change R07 0.00 0.50 0.50 Result Virus Infected System Moderatel y Secured System Secure System
  • 10. International Journal of Fuzzy Logic Systems (IJFLS) Vol.3, No2, April 2013 72 [3] BabakB. R.., Maslin M. and Suhaimi I. (2011), “Evolution of Computer Virus Concealment and Anti- Virus Techniques: A Short Survey”,International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 1, pp. 113-121. [4] Cengiz K., Sezi C., Nufer Y.A. and Murat G. (2007), “Fuzzy multi-criteria evaluation of industrial robotic systems” , Computers & Industrial Engineering, Vol. 52, Issue 4, Pages 414–433. [5] Christian J. and Gustav E. (2003), “Optimizing Genetic Algorithms for Time Critical Problems”,Department of Software Engineering and Computer Sciencelekinge Institute of Technology Box 520 SE ä 372 25 Ronneby Sweden. [6] Christos S. and Dimitros S. (2008) “Neural Network”, retrieved from http://www.docstoc.com/docs/15050/neural-networks. [7] Larry A. (2013), “How to Identify Computer Virus Symptoms” retrieved online from http://www.ehow.com/how_4903119_identify-computer-virus-symptoms.html#ixzz2Mr [8] Hkust,(2002), Types of Virus”, retrieved online from http://www.ust.hk/itsc/antivirus/general/types.html [9] Kasabov N. K. (1998), “Foundations of neural networks, fuzzy systems, and knowledge engineering”, A Bradford Book, The MIT Press Cambridge, Massachusetts London, England, ISBN 0-262-11212-4. [10] Leondes C (2010), “The Technology of Fuzzy Logic Algorithm retrieved from Suite101.com/examples-of-expert-System-application-in-artificial Intelligence. [11] Mathias K. (2003), “A Critical Look at the regulations of Computer Viruses”, International Journal of Law and Information technology, Retrieved online from http://www.digital-rights.net/wp- content/uploads/2008/01/klang_virus_ijlit.pdf. [12] Nitesh K. D., Lokesh m., Mahendra S. C. and Bhabesh K. D., (2012), “The New Age OfComputer Virus And Their Detection”, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.3, retrieved on from http://airccse.org/journal/jnsa12_current.html [13] Robert F. (1995), “Neural Fuzzy Systems”retrieved online from http://faculty.petra.ac.id/resmana/basiclab/fuzzy/fuzzy_book.pdf. [14] Simon S.H. (1999), “Neural Network: A comprehensive Foundation, Pretice Hall, Chapter 1-15, Pp. 1-889) [15] Tom B. (2002), “Retail Market Basket Analysis: A Quantitative Modelling Approach” Dissertation submitted to obtain the degree of Doctor in Applied Economic Sciences at the Limburg University Center. [16] Wikipedia (2013), “Computer virus” retrieved online from en.wikipedia.org/wiki/ [17] Zadeh L. A. (1965), “Fuzzy sets, Information and Control”, Vol.8, pp.338-353.