1 resultado para Networks of Evolutionary Processors
em Nottingham eTheses
Filtro por publicador
- KUPS-Datenbank - Universität zu Köln - Kölner UniversitätsPublikationsServer (1)
- Repository Napier (3)
- Aberdeen University (3)
- Academic Archive On-line (Stockholm University; Sweden) (1)
- Academic Research Repository at Institute of Developing Economies (2)
- Acceda, el repositorio institucional de la Universidad de Las Palmas de Gran Canaria. España (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (13)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (6)
- Archimer: Archive de l'Institut francais de recherche pour l'exploitation de la mer (2)
- Archive of European Integration (3)
- Aston University Research Archive (28)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (10)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (47)
- Biodiversity Heritage Library, United States (2)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (70)
- Brock University, Canada (5)
- Bucknell University Digital Commons - Pensilvania - USA (1)
- Bulgarian Digital Mathematics Library at IMI-BAS (9)
- CentAUR: Central Archive University of Reading - UK (55)
- Central European University - Research Support Scheme (1)
- Cochin University of Science & Technology (CUSAT), India (6)
- Coffee Science - Universidade Federal de Lavras (1)
- Consorci de Serveis Universitaris de Catalunya (CSUC), Spain (52)
- Cor-Ciencia - Acuerdo de Bibliotecas Universitarias de Córdoba (ABUC), Argentina (1)
- CORA - Cork Open Research Archive - University College Cork - Ireland (4)
- Corvinus Research Archive - The institutional repository for the Corvinus University of Budapest (1)
- CUNY Academic Works (1)
- Department of Computer Science E-Repository - King's College London, Strand, London (1)
- Digital Commons - Michigan Tech (1)
- Digital Commons @ Winthrop University (1)
- Digital Commons at Florida International University (23)
- DigitalCommons - The University of Maine Research (1)
- DigitalCommons@The Texas Medical Center (9)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (47)
- Duke University (1)
- Ecology and Society (1)
- FUNDAJ - Fundação Joaquim Nabuco (3)
- Glasgow Theses Service (4)
- Greenwich Academic Literature Archive - UK (2)
- Illinois Digital Environment for Access to Learning and Scholarship Repository (2)
- Institute of Public Health in Ireland, Ireland (1)
- Instituto Gulbenkian de Ciência (2)
- Instituto Politécnico de Bragança (1)
- Instituto Politécnico de Leiria (1)
- Instituto Politécnico do Porto, Portugal (18)
- Massachusetts Institute of Technology (4)
- Memorial University Research Repository (2)
- National Center for Biotechnology Information - NCBI (36)
- Nottingham eTheses (1)
- Portal de Revistas Científicas Complutenses - Espanha (3)
- Publishing Network for Geoscientific & Environmental Data (7)
- QSpace: Queen's University - Canada (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (8)
- Repositório da Escola Nacional de Administração Pública (ENAP) (2)
- Repositório da Produção Científica e Intelectual da Unicamp (4)
- Repositório da Universidade Federal do Espírito Santo (UFES), Brazil (7)
- Repositório de Administração Pública (REPAP) - Direção-Geral da Qualificação dos Trabalhadores em Funções Públicas (INA), Portugal (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (1)
- Repositório Digital da UNIVERSIDADE DA MADEIRA - Portugal (1)
- Repositório do Centro Hospitalar de Lisboa Central, EPE - Centro Hospitalar de Lisboa Central, EPE, Portugal (1)
- Repositorio Institucional de la Universidad de Málaga (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (34)
- Repositorio Institucional Universidad de Medellín (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (14)
- SAPIENTIA - Universidade do Algarve - Portugal (2)
- School of Medicine, Washington University, United States (1)
- Scielo Saúde Pública - SP (10)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- Universidad de Alicante (2)
- Universidad del Rosario, Colombia (12)
- Universidad Politécnica de Madrid (23)
- Universidade Complutense de Madrid (2)
- Universidade do Minho (13)
- Universidade Federal do Pará (2)
- Universidade Federal do Rio Grande do Norte (UFRN) (3)
- Universidade Técnica de Lisboa (1)
- Universitat de Girona, Spain (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (6)
- Université de Lausanne, Switzerland (180)
- Université de Montréal, Canada (40)
- University of Canberra Research Repository - Australia (1)
- University of Michigan (5)
- University of Queensland eSpace - Australia (38)
- University of Southampton, United Kingdom (1)
- University of Washington (5)
- WestminsterResearch - UK (1)
Resumo:
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the dasiabotmaster of a botnetpsila. In this work, we use the biologically inspired dendritic cell algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single hot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.