ADAPTIVE INFORMATION TECHNOLOGY OF THE TROJAN’ DETECTION IN COMPUTER SYSTEMS
DOI:
https://doi.org/10.47839/ijc.10.3.755Keywords:
Trojans, computer system Trojan diagnosis, fuzzy logic, artificial immune systems, antivirus software, antiviral monitor, antiviral scanner.Abstract
Adaptive information technology of computer systems Trojans diagnosing, which includes methods of diagnosing computer systems in monitor and scanner modes and allows improving reliability and efficiency, is developed. It is based on the behavioral model and the model of diagnosis. Computer system Trojan diagnosis software, which made it possible to detect the new Trojans with high reliability and efficiency, was developed.References
Yevgen Kasperskyi, Computer hucking, 1-st edition, Spb.: Piter, 2009. 208 p. (in Russian)
Szor P., The Art of Computer Virus Research and Defense, Addison Wesley Professional, 2005. 744 p.
Erbschloe M., Trojans, worms and spyware. A Computer Security Professional’s Guide to Malicious Code, Burlington. Elsevier Butterworth-Heinemann, 2005. 212 p.
AV Comparatives, Independent Tests of Anti-Virus Software, http://www.av-comparatives.org.
O. Savenko, S. Lysenko, Model search process Trojans in personal computers, Radio electronic and computer systems, 7 (2008). – pp. 87-92. (in Ukrainian)
R. Grafov, O. Savenko, S. Lysenko, Using fuzzy logic to search for Trojan software in computing systems, Visnyk of Chernivtsi national university, 6 (2009). – pp. 85-91. (in Ukrainian)
M. Ayara, J. Timmis, L.N. de Lemos, R. de Castro, R. Duncan In J. Timmis, P.J. Bentley, Negative selection: How to generate detectors, 1st International Conference on Artificial Immune Systems, University of Kent at Canterbury, 2002. p. 89-98.
O. Savenko, S. Lysenko. The development of process of Trojan detection using artificial immune systems, Visnyk of Khmelnytskyi national university, 5 (2008). – pp. 183-188. (in Ukrainian)
Forrest S., Perelson A.S., L. Allen, Self-nonself discrimination in a computer, Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1994. р. 202-212.
S. Lysenko, A. Gontar, A. Shevtsov, Software development of the intelligent method of the trojan detection in personal computers, Visnyk of Khmelnytskyi national university, 1 (2010). – pp.98-105. (in Ukrainian)
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.