Detection of traditional and new types of Malware using Host-based detection scheme  

Abstract

In this paper, we have discussed many traditional and new types of worms including c-worms also-worms stands for camouflaging worms because of its nature of self propagating and hiding nature. An active worm refers to a malicious software program that propagates itself on the Internet to infect other computers. The propagation of the worm is based on exploiting vulnerabilities of computers on the Internet. This paper also shows the working of various worms and their detection system. These detection techniques not only detect worms but also detect various malware attacks. 

Authors and Affiliations

Satish N. Chalurkar , Dr. B. B. Meshram

Keywords

Related Articles

Agent in Ecommerce Application Based on Cloud Environment 

— In this paper secure dealer agent mechanism is implemented to provide market oriented approach by using cloud computing environment. Cloud by leveraging technologies, provides thought on market based resource m...

Robustness of RC4 against Differential attack  

Cryptanalysis of ciphers is a technique used to find flaws in the cryptographic algorithm and try to overcome these flaws to give much better security. There are many cryptographic algorithms such as DES, AES, RS...

A Review on Concurrency Fault Detection Techniques 

The UML is the most common language that is used for system modeling. But, this language has been designed as a general purpose modeling language that might need modeling constructs for the specific real time embed...

Tracking of Moving object in Video scene using Neural Network  

Real-time object tracking is recently becoming more and more important in the field of video analysis and processing. Applications like traffic-control, user-computer interaction, online video dispensation and prod...

Security and Privacy in Emerging Wireless Networks with Mobile Sinks 

Mobile sinks (MSs) are more significant in many wireless sensor network (WSN) applications for well-organized data gathering and for unique and revoking compromised sensors. Mobile sinks are act as intermediate nod...

Download PDF file
  • EP ID EP130979
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Satish N. Chalurkar, Dr. B. B. Meshram (2012). Detection of traditional and new types of Malware using Host-based detection scheme  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 341-346. https://europub.co.uk/articles/-A-130979