WEWorm: An Ethical Worm Generation Toolkit

نویسندگان

  • Mark Wallis
  • Frans A. Henskens
چکیده

One of the largest threats to network security in Internet-connected corporate networks is attack via worms. Worms infiltrate the network and compromise security, consuming processor cycles and network bandwidth that would otherwise be available for corporate use. This research analyses a particular strain of network worm called the “Ethical worm”, which is targeted towards beneficial means rather than malicious. Also presented is a design for an Ethical worm generation toolkit (named WEWorm) that will aid System administrators in the cleanup of an infected network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Trajectory Generation for a Robotic Worm via Parameterization by B-Spline Curves

In this paper we intend to generate some set of optimal trajectories according to the number of control points has been applied for parameterizing those using B-spline curves. The trajectories are used to generate an optimal locomotion gait in a crawling worm-like robot. Due to gait design considerations it is desired to minimize the required torques in a cycle of gait. Similar to caterpillars,...

متن کامل

Abstract—IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation Written by Administrator Wednesday, 16 March 2011 09:20 Last Updated Monday, 21 March 2011 07:11 In recent era, Internet worms are one of seriousthreats which have been a major cause of intrusion attempts.Traditional Intrusion Detection Systems (IDS) store allknown worm signatures and monitors real time traffic ...

متن کامل

Abstract—IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation Written by Administrator Wednesday, 16 March 2011 09:20 Last Updated Monday, 21 March 2011 07:11 In recent era, Internet worms are one of seriousthreats which have been a major cause of intrusion attempts.Traditional Intrusion Detection Systems (IDS) store allknown worm signatures and monitors real time traffic ...

متن کامل

Abstract—IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation Written by Administrator Wednesday, 16 March 2011 09:20 Last Updated Monday, 21 March 2011 07:11 In recent era, Internet worms are one of seriousthreats which have been a major cause of intrusion attempts.Traditional Intrusion Detection Systems (IDS) store allknown worm signatures and monitors real time traffic ...

متن کامل

Abstract—IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation Written by Administrator Wednesday, 16 March 2011 09:20 Last Updated Monday, 21 March 2011 07:11 In recent era, Internet worms are one of seriousthreats which have been a major cause of intrusion attempts.Traditional Intrusion Detection Systems (IDS) store allknown worm signatures and monitors real time traffic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007