Novel Approach for the propagation and detection of active worm in a Virtual System

نویسندگان

  • A.S.N. Chakravarthy
  • K. Manasa Veena
  • K. Renuka
چکیده

Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms because they can camouflage (hide) itself from the detection schemes by manipulating their scan traffic volume. In this paper we have implemented an approach to propagate and also to detect and delete different types of worms in the network and we implemented it in a virtual system. For this approach we have used socket programming. The file streams for propagation and detection and java swings for better GUI purpose. Our paper thus propagates a selected worm from the list of worms given to the user, detects and deletes them in the virtual system. Keywords–Worm; C-Worm; Virtual System; Socket; File Streams; Warhol Worm

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

A Fast Voltage Collapse Detection and Prevention Based on Wide Area Monitoring and Control

Voltage stability is one of the most important factors in maintaining reliable operation of power systems. When a disturbance occurs in the power system, it usually causes instabilities and sometimes leads to voltage collapse (VC). To avoid such problems, a novel approach called Vector Analysis (VA) is proposed that exploits a new instability detection index to provide wide area voltage stabili...

متن کامل

A Novel Reference Current Calculation Method for Shunt Active Power Filters using a Recursive Algebraic Approach

This paper presents a novel method to calculate the reference source current and the referencecompensating current for shunt active power filters (SAPFs). This method first calculates theamplitude and phase of the fundamental load current from a recursive algebraic approach blockbefore calculating the displacement power factor. Next, the amplitude of the reference mains currentis computed with ...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012