Detection of Non-overlapping C-Worms: A Survey

Abstract

Internet worms place a major security threats to the Internet. This is due to the aptitude of worms to propagate in an automated fashion as they progressively compromise computers on the Internet. Internet worms develop gradually during their propagation and thus place great challenges to preserved against them. In this paper, we examine a new class of active worms, referred to as Non-overlapping Camouflaging Worm .The Non-overlapping C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the Non-overlapping C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the Non-overlapping C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of NOC worm. Motivated by our observations, we design a detection method that uses two-step procedures that combines a first stage change point detection with a second stage growth rate inference to confirm the existence of a worm. This scheme is better than the NOC-worm

Authors and Affiliations

Khushboo Joshi

Keywords

Related Articles

Concise and Informative Title of the Manuscript: Perception and Feedback of Second Year Medical Students on Teaching Learning Methodology and Evaluation Methods in Pharmacology

Background: In order to ensure the better teaching-learning methodology in pharmacology, regular feedback from students about their views of learning experience is a very important. Objectives: The purpose of this study...

An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications

Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatu...

Data Confidentiality and Security in Cloud Computing Using KIST Algorithm

Now days quickly expanded utilization of cloud computing in the numerous association and IT commercial industries and furnishes latest software solution with cost effective. So the cloud computing give us numerous of adv...

An Intelligent and Electronic System based Classification and Prediction for Heart Disease Diagnosis

The healthcare industry collects massive amounts of healthcare data which, unfortunately, are not “mined” to discover hidden information for effective decision making. Discovery of hidden patterns and relationships often...

A Novel Design and Fabrication of Electromagnetic Internal Combustion Engines

This paper reports an investigation that was carried out in a magnetic engine is according to the concept appears to be a so-called "perpetual motion machine". Here you will find its images, patent, and also you will lea...

Download PDF file
  • EP ID EP220468
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Khushboo Joshi (2014). Detection of Non-overlapping C-Worms: A Survey. International journal of Emerging Trends in Science and Technology, 1(4), 492-498. https://europub.co.uk/articles/-A-220468