Detection of Non-overlapping C-Worms: A Survey
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 4
Abstract
Internet worms place a major security threats to the Internet. This is due to the aptitude of worms to propagate in an automated fashion as they progressively compromise computers on the Internet. Internet worms develop gradually during their propagation and thus place great challenges to preserved against them. In this paper, we examine a new class of active worms, referred to as Non-overlapping Camouflaging Worm .The Non-overlapping C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the Non-overlapping C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the Non-overlapping C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of NOC worm. Motivated by our observations, we design a detection method that uses two-step procedures that combines a first stage change point detection with a second stage growth rate inference to confirm the existence of a worm. This scheme is better than the NOC-worm
Authors and Affiliations
Khushboo Joshi
Malicious Agent Detection In Multi Party Data Access Structure
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some amount of data is leaked and found in an unauthorized machines (e.g., on the internet or computer). The distributor...
Impact of Electronic Gadgets
The electronic gadgets are very popular among the people and the people are very interested used of the electronic gadgets. So, here based on the craze among the people the survey based study is performed and collected d...
A Framework for Medical Assistance using Internet of Things Architecture
Remote monitoring of patient is one of the important areas of research in the medical field. With the advancements in the field of sensors and semiconductors it is possible to monitor a patient and provide him medication...
Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario
In this paper we present a survey on Bluetooth technology regarding the threats and vulnerability attacks during data transfer on its security mechanism. Bluetooth technology uses the personal area network (PAN). It is t...
Wind Power Generation System Using Railway – A Prototype Model
Since the conventional power generation involved natural resource which are depleting day by day, the use of non-conventional source can be a better alternative in generation of electricity. Wind power is a major source...