SlideShare a Scribd company logo
1 of 25
Artificial Immune System
for
Computer Security
Presenting by
NAME Sweta leena panda
ARTIFICIAL IMMUNE SYSTEM
 Introduction







Immune system
Artificial immune system (AIS)
Virus
Negative selection Model
Different Models
Hetero Associative Model
INTRODUCTION
 The

threats and intrusions in IT systems can basically be
compared to human diseases with the difference that the
human body has an effective way to deal with them, what still
need to be designed for IT systems. The human immune
system (HIS) can detect and defend against yet unseen
intruders, is distributed, adaptive and multilayered to name
only a few of its features. Our immune system incorporates a
powerful and diverse set of characteristics which are very
interesting to use in AIS .
 “The Immune System is a complex adaptive system of cells
and molecules, distributed throughout our body, that provide
us with a basic defense against pathogenic organisms”
A GENTLE INTRODUCTION TO THE IMMUNE
SYSTEM
What problem is it that the IS solves?
The IS uses distributed detection to solve the problem
of distinguishing between self and nonself, which are
elements of the body, and foreign elements respectively
(actually, the success of the IS is more dependent on its
ability to distinguish between harmful nonself, and
everything else).
Why is this a hard problem?
because there are so many patterns in nonself, on the
order of 1016, that have to be distinguished from 106 self
patterns; because the environment is highly distributed;
because the body must continue to function all the time.
HOW DOES THE IS SOLVE THIS PROBLEM?
 Most

elementary is the
skin, which is the first
skin
barrier to infection. Another
barrier is physiological
where conditions such as
pH and temperature
provide inappropriate living
conditions for foreign
organisms. Once
pathogens have entered
the body, they are dealt
with by the innate IS and
by the acquired immune
response system.
system




Through a process called af finity maturation , which is essentially a
Dar winian process of variation and selection . Affinity maturation
involves a subset of lymphocytes, B-cells.
When a B-cell is activated (its affinity threshold is exceeded), by
binding to pathogens, it does two things.
things

1.

Firstly, it secretes a soluble form of its receptors, called antibodies,
antibodies
which bind to pathogens and inactivate them, or identify them to
phagocytes and other innate system defenses, which allows the innate
system to eliminate them.

2.

Secondly, the B-cell clones itself , but the copies producted by this
cloning are not perfect. Cloning is subject to ver y high mutation
rates, called somatic hypermutation , which can result in daughter
rates
cells that have somewhat different receptors from the parent.
AIS


Artificial Immune Systems (AIS) is a branch of
biologically inspired computation focusing on
many aspects of immune systems. AIS
development can be seen as having two target
domains: the provision of solutions to
engineering problems through the adoption of
immune system inspired concepts; and the
provision of models and simulations with which
to study immune system theories.
WHY ENGINEERS ARE ATTRACTED TO
THE IMMUNE SYSTEM
[1]
1)Distribution and self-organization
2)Learning, adaption, and memory
3)Pattern recognition.
4) Classification
VIRUS
 The

world has become a more interconnected place. Electronic
communication, e-commerce, network services, and the Internet
have become vital components of business strategies,
government operations, and private communications The
number of computer viruses has been increasing exponentially
from their first appearance in 1986 to over 55 000 different
strains identified today . Viruses were once spread by sharing
disks; now, global connectivity allows malicious code to spread
farther and faster. Similarly, computer misuse through network
intrusion is on the rise. applying immune mechanisms to
computer security has developed into a new field, attracting
many researchers. Forrest applied immune theor y to
computer abnormality detection for the first time in
1994 . Since then, many researchers have proposed various
different malware detection models and achieved some success.
DIFFERENT MODELS TO DETECT THE
VIRUS







Negative selection model
Partial matching rule
Anomaly detection model
Self & Non-self model
A Hierarchical Artificial Immune Model
Agent based algorithm
NEGATIVE SELECTION MODEL
NEGATIVE SELECTION
PARTIAL MATCHING RULE
ANOMALY DETECTION MODEL
SELF & NON-SELF MATCHING
AGENT BASED ALGORITHM


















initialize Agent () {
Receive agent from server
Load it into the target machine
Agent( ) } } Agent(){
Scan memory with the help of agent to known malware
for each process in memory{
signature=extractSignature(processID)
Scan memory for processes according to “self” & “Non-self” database entries
If process is “non-self” database{
Status=PreventiveAction(processID, signature) } }
// after assurance that all processes in memory are “self”
while agentAge<criticalAge{
Monitor all processes loaded in memory
If loaded process not self{
Run Agent to scan if a known malware{
if yes, terminate process and update log file
else status=PreventiveAction(processID, signature) } } }
HETERO ASSOCIATIVE MODEL
(BAM MODEL)



 

CODE FOR DETECT THE VIRAL CODE &
LEGAL CODE

 let

Ni = Legal_code
 let Nj = pseudo_ code
 let No = Viral_code
 creating a training set & comprised of self pattern
 initially Ni != Nj

& Ni != No
 for(i=0;I<10;i++)
 for(j=0;j<=10;j++)
 use sliding window principle
 if Ni match with Nj

& Ni mismatch with No

then Nj = legal code

& No = viral code
 end
USING BAM ALGORITHM DETECT THE
VIRAL CODE






















Let A1 is the = Legal code & B1 is the = Pseudo code

  Let A1 is the = Legal code & B1 is the = Pseudo code
A1 = (100001)
B1 = (11000)
 
A2 = (011000)
B2 = (10100)
 
A3 = (001011)
B3 = (01110)
 
converting these in bipolar form
 
 
X1 = (1 -1 -1 -1 -1 1 )
Y1 = (11-1 -1 -1 )
 
X2 = (-111-1-1-1)
Y2 = (1-11-1-1)
 
X3 = (-1-11-111)
Y3 = (-1111-1)
 
calculate the matrix corrlation
 
T

T

T
1

1

1

-3

-1

1

-3

1

-1

1

-1

-1

3

1

-1

-1



-1

-1

1

3

 

 

 



-3



1

1

3

 



= -1

3

-1

1

-1

1











let us suppose that we start with
α = X3
αM = ( -1 -1 1 -1 1 1 )
1
1
-3
-1
1
 
1
-3
 
-1
-1
 
-1
-1

1

-1

1

3

1

-1

-1

1

3



-3







1

3

 
-1




1

 
= [ -6 6 6 6 -6 ]
 

3

-1

1

-1

1
CONTINUE













β’ = (-1 1 1 1 -1)
β’MT = [ -5 -5 5 -3 7 5]
ø (β’MT ) = [-1 -1 1 -1 1 1] = α’
α’M = ( -1 -1 1 -1 1 1)
(M) = (-6 6 6 6 -6) 
ø (α’M) = (-1 1 1 1 -1) = β” = β’
If β’ = β” then Legal code = pseudo code then the pseudo code is
the legal code
If β’ ≠ β” then Legal code ≠ pseudo code then the pseudo code is
the viral code
so here we conclude that B1 is a legal code .
CONCLUSION




We have described a novel AIS-based method
to overcome shortcomings in traditional AIS
models.
BAM Model is a easiest way to detect the virus
& missing letter & errors.

More Related Content

What's hot

Bayesian networks in AI
Bayesian networks in AIBayesian networks in AI
Bayesian networks in AIByoung-Hee Kim
 
The fundamentals of Machine Learning
The fundamentals of Machine LearningThe fundamentals of Machine Learning
The fundamentals of Machine LearningHichem Felouat
 
Machine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural NetworksMachine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural NetworksFrancesco Collova'
 
Cuckoo Search Algorithm - Beyazıt Kölemen
Cuckoo Search Algorithm - Beyazıt KölemenCuckoo Search Algorithm - Beyazıt Kölemen
Cuckoo Search Algorithm - Beyazıt KölemenBeyazıt Kölemen
 
FIRE DETECTION USING VIDEO ANALYTICS
FIRE DETECTION USING VIDEO ANALYTICSFIRE DETECTION USING VIDEO ANALYTICS
FIRE DETECTION USING VIDEO ANALYTICSGaurav Deshmukh
 
Swarm Intelligence Presentation
Swarm Intelligence PresentationSwarm Intelligence Presentation
Swarm Intelligence Presentationlatcole
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural networkNagarajan
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareAshish Arora
 
Cuckoo Optimization ppt
Cuckoo Optimization pptCuckoo Optimization ppt
Cuckoo Optimization pptAnuja Joshi
 
Cat and dog classification
Cat and dog classificationCat and dog classification
Cat and dog classificationomaraldabash
 
Deep Learning - CNN and RNN
Deep Learning - CNN and RNNDeep Learning - CNN and RNN
Deep Learning - CNN and RNNAshray Bhandare
 
Computational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaComputational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaPedro Almir
 
Machine learning seminar ppt
Machine learning seminar pptMachine learning seminar ppt
Machine learning seminar pptRAHUL DANGWAL
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersGianmario Spacagna
 
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Simplilearn
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsJulie Greensmith
 

What's hot (20)

Bayesian networks in AI
Bayesian networks in AIBayesian networks in AI
Bayesian networks in AI
 
The fundamentals of Machine Learning
The fundamentals of Machine LearningThe fundamentals of Machine Learning
The fundamentals of Machine Learning
 
Machine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural NetworksMachine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural Networks
 
Cuckoo Search Algorithm - Beyazıt Kölemen
Cuckoo Search Algorithm - Beyazıt KölemenCuckoo Search Algorithm - Beyazıt Kölemen
Cuckoo Search Algorithm - Beyazıt Kölemen
 
Swarm intelligence
Swarm intelligenceSwarm intelligence
Swarm intelligence
 
FIRE DETECTION USING VIDEO ANALYTICS
FIRE DETECTION USING VIDEO ANALYTICSFIRE DETECTION USING VIDEO ANALYTICS
FIRE DETECTION USING VIDEO ANALYTICS
 
Swarm Intelligence Presentation
Swarm Intelligence PresentationSwarm Intelligence Presentation
Swarm Intelligence Presentation
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
Cuckoo Optimization ppt
Cuckoo Optimization pptCuckoo Optimization ppt
Cuckoo Optimization ppt
 
Firefly algorithm
Firefly algorithmFirefly algorithm
Firefly algorithm
 
Cat and dog classification
Cat and dog classificationCat and dog classification
Cat and dog classification
 
Deep Learning - CNN and RNN
Deep Learning - CNN and RNNDeep Learning - CNN and RNN
Deep Learning - CNN and RNN
 
Computational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaComputational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using Athena
 
Machine learning seminar ppt
Machine learning seminar pptMachine learning seminar ppt
Machine learning seminar ppt
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-Encoders
 
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
 
Perceptron
PerceptronPerceptron
Perceptron
 

Viewers also liked

Security as an Immune System
Security as an  Immune SystemSecurity as an  Immune System
Security as an Immune SystemTim Rolston
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection khawla Osama
 
Modified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemModified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemIAEME Publication
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Kent State University
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionAboul Ella Hassanien
 
Negative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionNegative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionXavier Llorà
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attackUltraUploader
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and ApplicationsLeandro de Castro
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune SystemsLeandro de Castro
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (14)

Security as an Immune System
Security as an  Immune SystemSecurity as an  Immune System
Security as an Immune System
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
 
Modified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemModified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problem
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detection
 
Negative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionNegative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly Detection
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Data mining
Data miningData mining
Data mining
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Artificial Immune System for Computer Security

Microsoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASMicrosoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASbutest
 
A distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemA distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemUltraUploader
 
Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a reviewijfcstjournal
 
An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system forcsandit
 
Ijfls05
Ijfls05Ijfls05
Ijfls05ijfls
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationUltraUploader
 
A security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agentsA security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agentsijccsa
 
A security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agentsA security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agentsijccsa
 
Applications of immune system computing
Applications of immune system computingApplications of immune system computing
Applications of immune system computingUltraUploader
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Waqas Tariq
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesTanjarul Islam Mishu
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesIJCSIS Research Publications
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.pptAyushDey1
 
JavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptxJavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptxGrace Jansen
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 

Similar to Artificial Immune System for Computer Security (20)

Microsoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASMicrosoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
 
A distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune systemA distributed approach against computer viruses inspired by the immune system
A distributed approach against computer viruses inspired by the immune system
 
Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a review
 
An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system for
 
Ijmet 10 01_169
Ijmet 10 01_169Ijmet 10 01_169
Ijmet 10 01_169
 
Ijfls05
Ijfls05Ijfls05
Ijfls05
 
50120130406047
5012013040604750120130406047
50120130406047
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimization
 
A security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agentsA security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agents
 
A security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agentsA security model for cloud computing based on autonomous biological agents
A security model for cloud computing based on autonomous biological agents
 
Applications of immune system computing
Applications of immune system computingApplications of immune system computing
Applications of immune system computing
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Vaccines fast
Vaccines fastVaccines fast
Vaccines fast
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.ppt
 
JavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptxJavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptx
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 

More from Sweta Leena Panda

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR Sweta Leena Panda
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYSweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR Sweta Leena Panda
 

More from Sweta Leena Panda (20)

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
 
DrData Project
DrData ProjectDrData Project
DrData Project
 
DrData
DrDataDrData
DrData
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Artificial Immune System for Computer Security

  • 1. Artificial Immune System for Computer Security Presenting by NAME Sweta leena panda
  • 2. ARTIFICIAL IMMUNE SYSTEM  Introduction       Immune system Artificial immune system (AIS) Virus Negative selection Model Different Models Hetero Associative Model
  • 3. INTRODUCTION  The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still need to be designed for IT systems. The human immune system (HIS) can detect and defend against yet unseen intruders, is distributed, adaptive and multilayered to name only a few of its features. Our immune system incorporates a powerful and diverse set of characteristics which are very interesting to use in AIS .  “The Immune System is a complex adaptive system of cells and molecules, distributed throughout our body, that provide us with a basic defense against pathogenic organisms”
  • 4. A GENTLE INTRODUCTION TO THE IMMUNE SYSTEM What problem is it that the IS solves? The IS uses distributed detection to solve the problem of distinguishing between self and nonself, which are elements of the body, and foreign elements respectively (actually, the success of the IS is more dependent on its ability to distinguish between harmful nonself, and everything else). Why is this a hard problem? because there are so many patterns in nonself, on the order of 1016, that have to be distinguished from 106 self patterns; because the environment is highly distributed; because the body must continue to function all the time.
  • 5. HOW DOES THE IS SOLVE THIS PROBLEM?  Most elementary is the skin, which is the first skin barrier to infection. Another barrier is physiological where conditions such as pH and temperature provide inappropriate living conditions for foreign organisms. Once pathogens have entered the body, they are dealt with by the innate IS and by the acquired immune response system. system
  • 6.   Through a process called af finity maturation , which is essentially a Dar winian process of variation and selection . Affinity maturation involves a subset of lymphocytes, B-cells. When a B-cell is activated (its affinity threshold is exceeded), by binding to pathogens, it does two things. things 1. Firstly, it secretes a soluble form of its receptors, called antibodies, antibodies which bind to pathogens and inactivate them, or identify them to phagocytes and other innate system defenses, which allows the innate system to eliminate them. 2. Secondly, the B-cell clones itself , but the copies producted by this cloning are not perfect. Cloning is subject to ver y high mutation rates, called somatic hypermutation , which can result in daughter rates cells that have somewhat different receptors from the parent.
  • 7. AIS  Artificial Immune Systems (AIS) is a branch of biologically inspired computation focusing on many aspects of immune systems. AIS development can be seen as having two target domains: the provision of solutions to engineering problems through the adoption of immune system inspired concepts; and the provision of models and simulations with which to study immune system theories.
  • 8. WHY ENGINEERS ARE ATTRACTED TO THE IMMUNE SYSTEM [1] 1)Distribution and self-organization 2)Learning, adaption, and memory 3)Pattern recognition. 4) Classification
  • 9. VIRUS  The world has become a more interconnected place. Electronic communication, e-commerce, network services, and the Internet have become vital components of business strategies, government operations, and private communications The number of computer viruses has been increasing exponentially from their first appearance in 1986 to over 55 000 different strains identified today . Viruses were once spread by sharing disks; now, global connectivity allows malicious code to spread farther and faster. Similarly, computer misuse through network intrusion is on the rise. applying immune mechanisms to computer security has developed into a new field, attracting many researchers. Forrest applied immune theor y to computer abnormality detection for the first time in 1994 . Since then, many researchers have proposed various different malware detection models and achieved some success.
  • 10. DIFFERENT MODELS TO DETECT THE VIRUS       Negative selection model Partial matching rule Anomaly detection model Self & Non-self model A Hierarchical Artificial Immune Model Agent based algorithm
  • 15. SELF & NON-SELF MATCHING
  • 16.
  • 18.                  initialize Agent () { Receive agent from server Load it into the target machine Agent( ) } } Agent(){ Scan memory with the help of agent to known malware for each process in memory{ signature=extractSignature(processID) Scan memory for processes according to “self” & “Non-self” database entries If process is “non-self” database{ Status=PreventiveAction(processID, signature) } } // after assurance that all processes in memory are “self” while agentAge<criticalAge{ Monitor all processes loaded in memory If loaded process not self{ Run Agent to scan if a known malware{ if yes, terminate process and update log file else status=PreventiveAction(processID, signature) } } }
  • 20.     CODE FOR DETECT THE VIRAL CODE & LEGAL CODE  let Ni = Legal_code  let Nj = pseudo_ code  let No = Viral_code  creating a training set & comprised of self pattern  initially Ni != Nj  & Ni != No  for(i=0;I<10;i++)  for(j=0;j<=10;j++)  use sliding window principle  if Ni match with Nj  & Ni mismatch with No  then Nj = legal code  & No = viral code  end
  • 21. USING BAM ALGORITHM DETECT THE VIRAL CODE                     Let A1 is the = Legal code & B1 is the = Pseudo code   Let A1 is the = Legal code & B1 is the = Pseudo code A1 = (100001) B1 = (11000)   A2 = (011000) B2 = (10100)   A3 = (001011) B3 = (01110)   converting these in bipolar form     X1 = (1 -1 -1 -1 -1 1 ) Y1 = (11-1 -1 -1 )   X2 = (-111-1-1-1) Y2 = (1-11-1-1)   X3 = (-1-11-111) Y3 = (-1111-1)   calculate the matrix corrlation   T T T
  • 23.           let us suppose that we start with α = X3 αM = ( -1 -1 1 -1 1 1 ) 1 1 -3 -1 1   1 -3   -1 -1   -1 -1 1 -1 1 3 1 -1 -1 1 3  -3     1 3   -1   1   = [ -6 6 6 6 -6 ]   3 -1 1 -1 1
  • 24. CONTINUE          β’ = (-1 1 1 1 -1) β’MT = [ -5 -5 5 -3 7 5] ø (β’MT ) = [-1 -1 1 -1 1 1] = α’ α’M = ( -1 -1 1 -1 1 1) (M) = (-6 6 6 6 -6)  ø (α’M) = (-1 1 1 1 -1) = β” = β’ If β’ = β” then Legal code = pseudo code then the pseudo code is the legal code If β’ ≠ β” then Legal code ≠ pseudo code then the pseudo code is the viral code so here we conclude that B1 is a legal code .
  • 25. CONCLUSION   We have described a novel AIS-based method to overcome shortcomings in traditional AIS models. BAM Model is a easiest way to detect the virus & missing letter & errors.