{"id":"https://openalex.org/W2018257180","doi":"https://doi.org/10.1145/1389095.1389112","title":"Improving accuracy of immune-inspired malware detectors by using intelligent features","display_name":"Improving accuracy of immune-inspired malware detectors by using intelligent features","publication_year":2008,"publication_date":"2008-07-12","ids":{"openalex":"https://openalex.org/W2018257180","doi":"https://doi.org/10.1145/1389095.1389112","mag":"2018257180"},"language":"en","primary_location":{"id":"doi:10.1145/1389095.1389112","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1389095.1389112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100771200","display_name":"Muhammad Shafiq","orcid":"https://orcid.org/0000-0003-1909-9373"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"M. Zubair Shafiq","raw_affiliation_strings":["NUCES-FAST, Islamabad, Pakistan","NUCES-FAST, Islamabad, Pakistan#TAB#"],"affiliations":[{"raw_affiliation_string":"NUCES-FAST, Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"NUCES-FAST, Islamabad, Pakistan#TAB#","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110173633","display_name":"Syed Ali Khayam","orcid":null},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Syed Ali Khayam","raw_affiliation_strings":["SEECS-NUST, Rawalpindi, Pakistan","SEECS-NUST, Rawalpindi, Pakistan#TAB#"],"affiliations":[{"raw_affiliation_string":"SEECS-NUST, Rawalpindi, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"SEECS-NUST, Rawalpindi, Pakistan#TAB#","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103408949","display_name":"Muddassar Farooq","orcid":"https://orcid.org/0009-0009-1882-7819"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muddassar Farooq","raw_affiliation_strings":["NUCES-FAST, Islamabad, Pakistan","NUCES-FAST, Islamabad, Pakistan#TAB#"],"affiliations":[{"raw_affiliation_string":"NUCES-FAST, Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"NUCES-FAST, Islamabad, Pakistan#TAB#","institution_ids":["https://openalex.org/I201384688"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100771200"],"corresponding_institution_ids":["https://openalex.org/I201384688"],"apc_list":null,"apc_paid":null,"fwci":2.18,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.86577573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8028357028961182},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7476359009742737},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6799408197402954},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6781970858573914},{"id":"https://openalex.org/keywords/artificial-immune-system","display_name":"Artificial immune system","score":0.6450159549713135},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6057493686676025},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5021440982818604},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4903855323791504},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.42645734548568726},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4173777103424072},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36000925302505493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07751491665840149}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8028357028961182},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7476359009742737},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6799408197402954},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6781970858573914},{"id":"https://openalex.org/C93768804","wikidata":"https://www.wikidata.org/wiki/Q2518735","display_name":"Artificial immune system","level":2,"score":0.6450159549713135},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6057493686676025},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5021440982818604},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4903855323791504},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.42645734548568726},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4173777103424072},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36000925302505493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07751491665840149},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1389095.1389112","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1389095.1389112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1498351444","https://openalex.org/W1516113782","https://openalex.org/W1521843029","https://openalex.org/W1579457427","https://openalex.org/W1767465192","https://openalex.org/W1942111125","https://openalex.org/W2019207321","https://openalex.org/W2039390926","https://openalex.org/W2085533912","https://openalex.org/W2099111195","https://openalex.org/W2117699771","https://openalex.org/W2123770058","https://openalex.org/W2128773324","https://openalex.org/W2139212933","https://openalex.org/W2142669511","https://openalex.org/W2153635508","https://openalex.org/W2164210932","https://openalex.org/W2171048231","https://openalex.org/W3121147667","https://openalex.org/W3193477162","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W1987409039","https://openalex.org/W2274379716","https://openalex.org/W2381869356","https://openalex.org/W2562838041","https://openalex.org/W2384108410","https://openalex.org/W2540152232","https://openalex.org/W2383254572","https://openalex.org/W1006157206","https://openalex.org/W2362522936","https://openalex.org/W2619636815"],"abstract_inverted_index":{"In":[0],"this":[1,148],"paper,":[2],"we":[3,92,120],"show":[4],"that":[5,180],"a":[6,22,94,103,123,172],"Bio-inspired":[7,43],"classifier's":[8],"accuracy":[9],"can":[10],"be":[11],"dramatically":[12],"improved":[13],"if":[14],"it":[15],"operates":[16],"on":[17,46,58,69,99,171],"intelligent":[18,26,49,90],"features.":[19],"We":[20,36],"propose":[21],"novel":[23],"set":[24],"of":[25,32,40,105,145,192],"features":[27,183],"for":[28,102],"the":[29,38,47,59,70,85,89,143,150,186],"well-known":[30,42,114],"problem":[31],"malware":[33,135],"portscan":[34],"detection.":[35],"compare":[37],"performance":[39,118],"three":[41],"classifiers":[44,170],"operating":[45],"proposed":[48,182],"features:":[50],"(1)":[51],"Real":[52],"Valued":[53],"Negative":[54],"Selection":[55],"(RVNS)":[56],"based":[57,68],"adaptive":[60],"immune":[61,72],"system;":[62,73],"(2)":[63],"Dendritic":[64],"Cell":[65],"Algorithm":[66],"(DCA)":[67],"innate":[71],"and":[74,131,139,156,189,195],"(3)":[75],"Adaptive":[76],"Neuro":[77],"Fuzzy":[78],"Inference":[79],"System":[80],"(ANFIS).":[81],"To":[82,142],"empirically":[83],"evaluate":[84],"improvements":[86],"provided":[87],"by":[88],"features,":[91],"use":[93],"network":[95],"traffic":[96,110],"dataset":[97],"collected":[98],"diverse":[100],"endpoints":[101],"period":[104],"12":[106],"months.":[107],"The":[108,176],"endpoints'":[109],"is":[111,149],"infected":[112],"with":[113,162,167],"malware.":[115],"For":[116],"unbiased":[117],"comparison,":[119],"also":[121,166],"include":[122],"machine":[124],"learning":[125],"algorithm,":[126],"Support":[127],"Vector":[128],"Machine":[129],"(SVM),":[130],"two":[132],"state-of-the-art":[133],"statistical":[134],"detectors,":[136],"Rate-Limiting":[137],"(RL)":[138],"Maximum-Entropy":[140],"(ME).":[141],"best":[144],"our":[146,181],"knowledge,":[147],"first":[151],"study":[152],"in":[153],"which":[154],"RVNS":[155,194],"DCA":[157],"are":[158],"not":[159],"only":[160],"compared":[161],"each":[163],"other":[164,169],"but":[165],"several":[168],"comprehensive":[173],"real-world":[174],"dataset.":[175],"experimental":[177],"results":[178],"indicate":[179],"significantly":[184],"improve":[185],"TP":[187],"rate":[188,191],"FP":[190],"both":[193],"DCA.":[196]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
