Open Access Open Access  Restricted Access Subscription or Fee Access

OODA Principles for Finding Unknown Malware

S Murugan

Abstract


This paper is planned to give a model to "OODA Principles for Finding Unknown Malware", it portrays the state's general necessities with respect to the securing and execution of intrusion prevention and detection systems with intelligence (IIPS/IIDS). This is intended to give a more profound comprehension of interruption aversion and recognition standards with knowledge may be in charge of getting, actualizing or checking such frameworks in comprehension the innovation and techniques accessible.

Keywords: Artificial neural network (ANN), confidentiality, integrity and availability (CIA), intelligence intrusion prevention systems (IIPS), intelligence intrusion detection systems (IIDS)

Full Text:

PDF

References


Gomes R., da Frota Mattos L.A. Attacks detection based on Ip and Tcp protocols violations normal.

Guangmin L. Modeling unknown web attacks in network anomaly detection. ICCIT, Third International Conference on Convergence and Hybrid Information Technology. 2008; 2: 112–6p.

Dulanović N., Hinić D., Simić D. An intrusion prevention system as a proactive security mechanism in network infrastructure. Yugoslav J Oper Res. 2008; 18(1): 109–22p.

Ibrahim A., Farag M.A., Shouman T.S. et al. Intelligent system–worm detection.

Tafazzoli T., Sadjadi S.H. Malware fuzzy ontology for semantic web. Int. J. Comput Sci Net Sec. 2008 July; 8(7).

de Castro L.N., Von Zuben F.J. Immune and neural network models: theoretical and empirical comparisons. Evol Comput. IEEE. 2002; 6(3): 239–51




DOI: https://doi.org/10.37628/ijmdic.v1i2.107

Refbacks

  • There are currently no refbacks.