Detection of traditional and new types of Malware using Host-based detection scheme
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
In this paper, we have discussed many traditional and new types of worms including c-worms also-worms stands for camouflaging worms because of its nature of self propagating and hiding nature. An active worm refers to a malicious software program that propagates itself on the Internet to infect other computers. The propagation of the worm is based on exploiting vulnerabilities of computers on the Internet. This paper also shows the working of various worms and their detection system. These detection techniques not only detect worms but also detect various malware attacks.
Authors and Affiliations
Satish N. Chalurkar , Dr. B. B. Meshram
Agent in Ecommerce Application Based on Cloud Environment
— In this paper secure dealer agent mechanism is implemented to provide market oriented approach by using cloud computing environment. Cloud by leveraging technologies, provides thought on market based resource m...
Robustness of RC4 against Differential attack
Cryptanalysis of ciphers is a technique used to find flaws in the cryptographic algorithm and try to overcome these flaws to give much better security. There are many cryptographic algorithms such as DES, AES, RS...
A Review on Concurrency Fault Detection Techniques
The UML is the most common language that is used for system modeling. But, this language has been designed as a general purpose modeling language that might need modeling constructs for the specific real time embed...
Tracking of Moving object in Video scene using Neural Network
Real-time object tracking is recently becoming more and more important in the field of video analysis and processing. Applications like traffic-control, user-computer interaction, online video dispensation and prod...
Security and Privacy in Emerging Wireless Networks with Mobile Sinks
Mobile sinks (MSs) are more significant in many wireless sensor network (WSN) applications for well-organized data gathering and for unique and revoking compromised sensors. Mobile sinks are act as intermediate nod...