CFP last date
20 January 2025
Reseach Article

Hybrid model for Computer Viruses: an Approach towards Ideal Behavior

by Ankur Singh Bist
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 17
Year of Publication: 2012
Authors: Ankur Singh Bist
10.5120/7001-9509

Ankur Singh Bist . Hybrid model for Computer Viruses: an Approach towards Ideal Behavior. International Journal of Computer Applications. 45, 17 ( May 2012), 16-19. DOI=10.5120/7001-9509

@article{ 10.5120/7001-9509,
author = { Ankur Singh Bist },
title = { Hybrid model for Computer Viruses: an Approach towards Ideal Behavior },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 17 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number17/7001-9509/ },
doi = { 10.5120/7001-9509 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:37:50.942403+05:30
%A Ankur Singh Bist
%T Hybrid model for Computer Viruses: an Approach towards Ideal Behavior
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 17
%P 16-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer viruses are big threat for our society . The expansion of various new viruses of varying forms make the prevention quite tuff . Here we proposed an ideal hybrid model to prevent from computer viruses. The proposed model try to produce the environment for static and nature changing viruses.

References
  1. F. Cohen. Viruses . PhD. Thesis, university of southern California 1985.
  2. Vb," ibm viruses(update)",virus vol. no. 1999,pp. 5-6.
  3. Szor,p. ,the art of computer viruses research and defense ,adison –Wesley ,professional,2005.
  4. Erdogan,o. and p. cao, "hash-av:fastvirus signature scanning by cache –resident filters", in ieee global telecommunication conference.
  5. Szor, P. and P. Ferrie, "Hunting for Metamorphic", in 11th
  6. Virus Bulletin International Conference, 2001, pp. 123-144.
  7. Catalin,b. and A. vi oiu,"optimiozation of antivirus"
  8. Bidgali,h. , handbook of information security ,wiley 2006.
  9. Jordan, M. , "Dealing with Metamorphism", Virus Bulletin, October 2002, pp. 4-6
  10. Aycock , j. computer viruses and malware, ab,Canada:springer,2006.
  11. Veldman, F. , "Generic Decryptors Emulators of the future", in IVPC conference, 1998.
  12. S. forest,S. hofmeyr,A. Somayaji, and t. longstaff,"A sense of self for Unix procesess". in IEEE symposium on security andprivacy. 1996.
  13. D. Wanger ,and d. dean . intrusion detection via static analysis". In IEEE symposium on security and privacy. 2001.
  14. Madihah mohd Saudi shaharudin Ismail "an efficient control of virus propagation"
  15. Christina Carrick and Qiang Yang(Simon Fraser University Burnaby, BC, Canada, V5A 1S6) , Irene Abi-Zeid and Luc Lamontagne(Defense Research Establishment Valcartier Decision Support Technology 2459, boul. Pie XI, nord Val Belair, Quebec, Canada, G3J 1X5),'' Activating CBR Systems through Autonomous'', Springer-Verlag Berlin Heidelberg 1999 .
  16. Magda liliana RUIZ ORDONEZ (Girona university),'' Multivariate statistical process control and case-based reasoning for situation assessment of sequencing barch reactors'',ISBN:978-84-691-6833-2,Dipositlegal:GI-1299-2008.
  17. M. siddiqui,M. C Wang and J. Lee data mining methods for malware detection using intrusion techniques in proceedings of artificial intelligence,2008.
  18. J. O Kephart ,"a biologically inspired immune for computers", proceedings on conference synthesis and simulation of living system,1994,pp. 985-996.
  19. M. fredrikson and s. jha,R. sailer,X. yan. "Synthesis near optimal malware specification from suspicious behavior". 2010,pp. 45-60.
Index Terms

Computer Science
Information Sciences

Keywords

Polymorphic False Negative false Positive Hybrid