Implementation of Network Based Worm Infection and Detection

Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. In this paper, the authors have successfully detected the worm propagation characteristics of different and using permutation scanning to find the worms using branch process model to provide total number of scan that ensure the worm will eventually die out. Their strategy can effectively contain both fast scan worms and slow scan worms without knowing the worm signature in advance or needing to explicitly detect the worm.

Provided by: Universal Association of Computer and Electronics Engineers Topic: Networking Date Added: May 2012 Format: PDF

Download Now

Find By Topic