This website uses cookies to ensure you have the best experience. Learn more

A Signature Based Approach Against Polymorphic Internet Worms

1967 words - 8 pages

h Babu Battula Ram Bilash(2010UCP233)
1
CONTENTS
1. Introduction
2. Related Work
3. Design
3.1 Failure Connection Design
3.2 Signature discoverion Design
4. Results
5. Conclusion
6. References
3
1. Introduction
Internet worms present a solemn threat to todays highly
networked computing environment. Unlike other threats
viruses and trojans, worms typically scatter automatically
without active human intervention, resulting in infection
rates that are considerably higher than those of traditional
viruses.
These Active internet worms spread in an automated fash-
ion and can
ood the internet in a very short time. Anti-
virus is signature-based technology. Anti-virus ...view middle of the document...

The technology directed to examine the way of the error
message, such as RESET in TCP and ICMP target un-
reachable message.
S. Chen et al. design approach to nd the worm, but the
impulse of false alarms take too much time to discover the
worms. S. E. Schechter et al. design a hybrid approach for
discovering scanning worms that is integrates notable im-
provements by two techniques: sequential hypothesis test-
ing and connection rate limiting. This approach can dis-
cover the internet worm but doesnot work well on discov-
ering stealthy worm. The threshold cant reach to discover
stealthy worm.
X. Yang et al. design approach for discovering the worms
has two sub approachs, the rst approach short term ap-
proach run to discover worm, but the second approach
longer term approach cant discover some kinds of stealthy
worm. The approach also cannot hold any equations to
determine specication when the equation runs in the ap-
proach to discover early worm if it has higher rate for value
in average of break link. Yang approach focus just for dis-
covered which computer contain the worm.
5
2. Related Work
Zou et al. presented the architecture of a complete worm
observoring system. The observoring system targets to pro-
vide comprehensive observation data on a worms actionss
for the early perception of the worm. Zou focused just on
the ICMP message.
Schechter et al. design worm perception method based
on the connection collapse. This approach can discover in-
ternets worm but cant work well on discovering stealthy
worm. The threshold for this approach cannot discover
stealthy worm.
Yang et al. design approach for discovering the worms has
two sub approachs, the rst approach short term approach
run to discover worm, but the second approach longer term
approach cant discover some kinds of stealthy worm.
Berk et al. tabled a scanning system by gathering ICMP
target Unreachable messages generated by routers for pack-
ets designated to unused IP addresses. Berk method doesnt
use TCP/RESET collapse connection technique.
Staniford Chen et al. proposed an intrusion perception sys-
tem called GrIDS, which can discover worm-infected hosts
in a local network through building the worms infection
graph.
S. Chen et al. idea was based on an eective approach
for discovering network and hang based on the breakdown
of the link request received at network routers. S. Chen
proposed distributed anti-worm architecture (DAW) that
automatically slows or stops the scatter of the worm.
6
3. Design
we studied two approachs, the rst is discover which
computer contain the worm and second approach to dis-
cover the congestion signature from the computer that in-
fected by the worm.
7
3.1 collapse Connection Design
This approach appoints dierence between regular link
and worm link. The worm scans dierent IP addresses ev-
ery second. The design hangs on the TCP collapse and
ICMP unreachable link on dierent addresses....

Find Another Essay On A Signature-Based Approach against Polymorphic Internet Worms

A Knowledge -based Approach to Innovation An Application for Project- based Firms

1055 words - 4 pages knowledge depend on networks of relationships in a PBO. Knowledge-based perspective concentrates on building up capabilities during the implementation of projects. Networks are formed by knowledge flows through collaboration, sub contract and strategic alliances.#Knowledge, Networks and InnovationAccording to the Knowledge-based View (KBV), knowledge is of strategic importance and firm's competitive advantage lies in its ability to integrate the

To Clone or Not To Clone... This is a essay against cloning and includes some references to genetic engineering.. It's loosely based on the persona of a political leader

1476 words - 6 pages Cloning and genetic engineering is a topic of much controversy in today's society. There are many religions that believe that cloning and/or genetic engineering should simply not be done because of the fact that it's not "God's (or whomever else they believe in) way". However, this is not the only cause of the controversy in regards to cloning and genetic engineering. Many others believe it is against human ethics and could be dangerous to

Internet Security

1618 words - 6 pages . Once the internet was introduced, millions of networks exposed both the user and server, to malicious attacks, such as viruses and hackers. Over the years these along with other attacks have continued to plague users, servers, and networks that are connected to the internet. On a regular basis, computers are infected by spyware, viruses, Trojan Horses, worms and many other software applications that can be destructive to computers, networks, and

The Evolution of the Computer Virus

2030 words - 9 pages Payloads- Traditionally, viruses were not intended to cause very destructible payload, though few viruses resulted in the Denial of Service (DoS) attacks. However with the evolution criminal activities over internet, the viruses have developed to inculcate keyloggers and password stealing capabilities within them. For an example, the 2003 "Lirva" worm had the capability to store keystores in a separate encrypted file. • Fast and Furious Worms This is a

Computer viruses

3440 words - 14 pages to find out the differences between a computer virus, a computer worm and a Trojan horse. The report will also include the common computer viruses, the different types of computer viruses, the reasons why computer viruses can be destructive and the different ways by which computer users can protect themselves against viruses, worms and Trojan horses.Computer VirusesA computer virus is a computer program that is hidden within another program that

Evaluation of Tools against Hacking and Cracking

4288 words - 17 pages cracking but the most important are:- Fire walls- Virus protection software- SSL (Secure Sockets Layer)Firewalls:Firewalls prevent unauthorized access by casual and malicious users on the public network (Internet) into a private network. It helps to protect against hackers and many computer viruses and worms'. The devices, which are used, are three primary types: packet filter, stateful inspection and the application proxy. The packet filter is the

Assessment of genetic diversity in some safflower genotypes showing variability for salt tolerance

996 words - 4 pages was followed as Chapman et. al. (2009), which one hundred and four were released by Chapman et. al. (2009) and five were the polymorphic markers in Naresh et. al. (2009). Fifty nine SSR primers were chosen between polymorphic SSR markers which developed by Hamdan et. al. (2011) and amplified based on their PCR condition. Then the reaction products were separated on a 12% non-denaturing polyacrylamide gels (Atto, Tokyo, Japan) with a 50-bp DNA

Topic: Web Security (Internet Banking)

1054 words - 4 pages in big companies; much more complicated encryptions are used so they are not easily cracked.In the final analysis, new viruses are found each and everyday making the internet world a dangerous place. Viruses, worms and even Trojan Horses can easy be downloaded to your computer easily if you are not protected. To ensure that you are protected to the fullest against these malicious programs, be positive that your antivirusPage 4 of 6program and

A In Depth Look At Malware, Spy-Ware, and Ad-Ware

2077 words - 8 pages Email from Viruses and Other Malware).Certain steps should be taken when preventing the infection of malware on a computer. Use an Internet firewall. A firewall is a piece of software or hardware that creates a protective barrier between the computer and potentially damaging content on the Internet. It helps guard the computer against malicious users and many computer viruses and worms.Download all patches for the operating system and email

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages environment and new business practices. Traditional models and techniques for characterizing and analyzing security and privacy are ill-equipped to deal with the much higher social complexity that is implicit in this new internet-based setting. (Liu, 2003) We live in a new Web-enable world, and reliable user authentication has become everyday more important. Insecure authentication systems can be catastrophic, especially in a corporate environment

Bird Mimicry Study-The eating habits of birds with different types of food - Colgate, Biology - Lab Report

2917 words - 12 pages mechanisms benefit the mimics. Also some predators have learned techniques in order to avoid toxic consumption and maximize nutrient intake. We tested the feeding bias of birds on a University campus in central NY and how it was affected by color and toxicity of prey using colored dough worms with varying palatability. We predicted that birds would be biased against red worms because of learned behavior from aposematic prey and that bird behavior would

Similar Essays

Rsa Based Undeniable Signature For A Group

1071 words - 5 pages 3. Proposed Approach In this paper, a new RSA-based undeniable signatures approach for a group is proposed. A group member can sign a document on behalf of the group without revealing the identity of the actual signer. The group secret key is split into two parts by Group Manager, one part is provided, as his group membership secret, to the group member; and the other part is provided to a trusted security mediator, SM. In our scheme, it is

A Cbr Based Approach To Itil Based Service Desk

1201 words - 5 pages APPROACH The Knowledge Management can be defined as doing what is needed to get the most out of knowledge resources. In Case-based Reasoning, new problems are solved according to previous experiences and each solved problem serves as a new case which can be helpful in solving incoming problems. Every Case-Based Reasoning system should consist: • A Case Library which is a repository for the previous cases and consists of knowledge created in the

A Problem Based Approach To Teaching About Pollution

2138 words - 9 pages A Problem-Based Approach to Teaching about Pollution Science is a very important subject for students to study in middle school. It is “More than a body of knowledge or a set of answers, science is a way of thinking about the world” (Beamon 20). Science forces students to think critically about ethical issues, such as pollution. This is often difficult for students because they must make the jump from the narrow parameters of their own

A Report On Network Security Based On The Text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc

1343 words - 5 pages A secure network is critical for the survival and success of many businesses. The rapid evolution of client/server networks, the phenomenal increase in the number of networks attached to the Internet, the widespread use of web browsers, and the growing commerce on the internet each require that communication networks are secure. Security concerns for private networks as well as for the Internet range from exposures to computer viruses to break