Detection of Non-overlapping C-Worms: A Survey
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 4
Abstract
Internet worms place a major security threats to the Internet. This is due to the aptitude of worms to propagate in an automated fashion as they progressively compromise computers on the Internet. Internet worms develop gradually during their propagation and thus place great challenges to preserved against them. In this paper, we examine a new class of active worms, referred to as Non-overlapping Camouflaging Worm .The Non-overlapping C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the Non-overlapping C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the Non-overlapping C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of NOC worm. Motivated by our observations, we design a detection method that uses two-step procedures that combines a first stage change point detection with a second stage growth rate inference to confirm the existence of a worm. This scheme is better than the NOC-worm
Authors and Affiliations
Khushboo Joshi
Concise and Informative Title of the Manuscript: Perception and Feedback of Second Year Medical Students on Teaching Learning Methodology and Evaluation Methods in Pharmacology
Background: In order to ensure the better teaching-learning methodology in pharmacology, regular feedback from students about their views of learning experience is a very important. Objectives: The purpose of this study...
An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications
Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatu...
Data Confidentiality and Security in Cloud Computing Using KIST Algorithm
Now days quickly expanded utilization of cloud computing in the numerous association and IT commercial industries and furnishes latest software solution with cost effective. So the cloud computing give us numerous of adv...
An Intelligent and Electronic System based Classification and Prediction for Heart Disease Diagnosis
The healthcare industry collects massive amounts of healthcare data which, unfortunately, are not “mined” to discover hidden information for effective decision making. Discovery of hidden patterns and relationships often...
A Novel Design and Fabrication of Electromagnetic Internal Combustion Engines
This paper reports an investigation that was carried out in a magnetic engine is according to the concept appears to be a so-called "perpetual motion machine". Here you will find its images, patent, and also you will lea...