Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A retrovirus inspired algorithm for virus detection & optimization
Edge K., Lamont G., Raines R.  Genetic and evolutionary computation (Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation, Seattle, Washington, Jul 8-12, 2006)103-110.2006.Type:Proceedings
Date Reviewed: Jun 13 2007

Virus attacks are a fatal threat to all computing systems. Currently, most virus detection methods are based on searching for a virus signature in a suspicious file, to determine if the file contains a specific virus. However, if the signature is mutated, the virus cannot be detected without additional work. This paper focuses on the additional work required. This research is known as clone selection with functional optimization, and is in the area of artificial intelligence (AI).

Since every virus signature must be stored and compared to every computer input file, this process of machine learning is time critical. The actual contribution of this paper is in the improvement of a classical approach with a backtracking known as reverse transcription, with the goal of improving the performance to search for a mature clone.

For beginners in this area, this paper is not a good start, for three main reasons. First, since the authors’ work strongly depends on the work of others, they refer readers to other papers, without discussing them. Second, the convergence of the authors’ method is not discussed. Last, the concept of “searching with backtracking” is only tested with benchmarks for proving function optimizations; the effectiveness of detecting new viruses is not tested. However, that seems to be the status quo on anti-virus systems research.

In summary, this work is a small step toward an ultimate goal of creating an immune system against computer viruses. It is an advanced reference on applied research into anti-virus methods.

Reviewer:  Cheer-Sun Yang Review #: CR134396 (0809-0920)
Bookmark and Share
  Reviewer Selected
 
 
Invasive Software (K.6.5 ... )
 
 
Learning (I.2.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
Rogue programs: viruses, worms and Trojan horses
Hoffman L. (ed) Van Nostrand Reinhold Co., New York, NY,1990. Type: Divisible Book
Sep 1 1991
Computer viruses and anti-virus warfare
Hruska J., Ellis Horwood, Upper Saddle River, NJ, 1990. Type: Book (9780131710672)
Sep 1 1991
The computer virus handbook
Levin R., Osborne/McGraw-Hill, Berkeley, CA, 1990. Type: Book (9780078816475)
Sep 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy