Research Item (3)
- Jan 2012
Due to the growing reliance that corporations and government agencies place on their computer networks, the significance of defending these systems from attack cannot be underestimated. A single malicious encroachment into a computer network can cause a great deal of damage to an organisation. Computer Security concerns the protection of information and property from misuse by unauthorized people. Computer forensics provides methods for the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the reconstruction of criminal activities or policy violation. Fuzzy logic can properly be used to help deal with issues associated with computer security and computer forensics. This chapter deals with the use of fuzzy logic in computer security and forensics, providing a general overview of some of its applications, recent algorithms, abilities, advantages and drawbacks.
- Jan 2012
- Computational Intelligence for Privacy and Security
In daily life, people are faced with problems that have more than one solution. In computing, and other fields, researchers and developers encounter computational problems that may have a large number of solutions. In these cases, it may be almost unfeasible to determine the best one. Evolutionary computation is an appropriate technique for finding an optimal solution to a problem. Among these problems, evolutionary computation can provide an efficient way to solve those associated with computer security and forensics. This chapter examines the approaches evolutionary computation offers to discover an optimal solution to a problem. Moreover, it overviews how evolutionary computation can be applied to different scenarios related to computer security and forensics.
- Sep 2011
- CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011
- International Conference on Risks and Security of Internet and Systems
Every day, the growing number of viruses causes major damage to computer systems. Existing antivirus products do not provide a full solution to the problems associated with viruses. One of the most encouraging recent developments in virus research is the use of logic formulae to model the behaviour of viruses, which provides alternatives to classic virus detection methods. The proposed research uses temporal logic and behaviour-based detection mechanism to detect viruses. Interval Temporal Logic (ITL) will be used to generate virus specifications, properties and formulae based on the analysis of the behaviour of computer viruses. The detection mechanism will use Tempura, the executable subset of ITL, i.e., satisfaction of a Tempura formula means a virus has been detected. The process will also use AnaTempura, an integrated workbench tool for ITL that supports our system specifications. AnaTempura will offer validation of the ITL specifications and detects whether a virus has occurred or not.