Networking

Implementation of Network Based Worm Infection and Detection

Download Now Free registration required

Executive Summary

Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. In this paper, the authors have successfully detected the worm propagation characteristics of different and using permutation scanning to find the worms using branch process model to provide total number of scan that ensure the worm will eventually die out. Their strategy can effectively contain both fast scan worms and slow scan worms without knowing the worm signature in advance or needing to explicitly detect the worm.

  • Format: PDF
  • Size: 727 KB