Detection of Non-overlapping C-Worms: A Survey
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 4
Abstract
Internet worms place a major security threats to the Internet. This is due to the aptitude of worms to propagate in an automated fashion as they progressively compromise computers on the Internet. Internet worms develop gradually during their propagation and thus place great challenges to preserved against them. In this paper, we examine a new class of active worms, referred to as Non-overlapping Camouflaging Worm .The Non-overlapping C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the Non-overlapping C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the Non-overlapping C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of NOC worm. Motivated by our observations, we design a detection method that uses two-step procedures that combines a first stage change point detection with a second stage growth rate inference to confirm the existence of a worm. This scheme is better than the NOC-worm
Authors and Affiliations
Khushboo Joshi
Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment
In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service pro...
Remote Automatic Meter Reading System with Instant Billing for MSEB
An RAMR (Remote Automatic Meter Reading) system is used to automatically collect data from various meters located in different area. In this paper we design and implement a Wireless Automatic Meter Reading System to solv...
Improved Fusion based Breast Ultrasound Image Segmentation technique
Image segmentation plays vital role in the biomedical imaging .Image segmentation is the process of dividing image into segmentation to extract the information. Breast Cancer is most common form of cancer found in women....
Occupational health hazards of welding workers: Piping Industry Perspective
The ergonomic safety standards are focused on the interaction between welders and the welding activities. Welders who perform the welding tasks under heat stress always experience with various types of injuries such as M...
Handwriting Recognition System – A Survey
Handwriting Recognition System has been studied in the last few decades. Many approaches are presented to recognize the hand written documents or paper. These approaches focus on how we recognize our hand written words a...