2008
DOI: 10.1109/comst.2008.4483668
|View full text |Cite
|
Sign up to set email alerts
|

A survey of internet worm detection and containment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
71
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 109 publications
(71 citation statements)
references
References 29 publications
0
71
0
Order By: Relevance
“…In the detection phase, a score is computed by counting the number of datagram bytes that fall outside the range defined for each byte. These mechanisms have limitations such as computational complexity [17], management overhead [18], high rates of false positives [13] and incur significant delays in deployment and detection [15].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the detection phase, a score is computed by counting the number of datagram bytes that fall outside the range defined for each byte. These mechanisms have limitations such as computational complexity [17], management overhead [18], high rates of false positives [13] and incur significant delays in deployment and detection [15].…”
Section: Related Workmentioning
confidence: 99%
“…The QPD module ensures that quiescent periods in network activity do not disappear because of constant worm scanning. These techniques consume resources in order to keep track of distinct connection and host information, especially in large networks [13], and they can only slow worm infections [2].…”
Section: Related Workmentioning
confidence: 99%
“…A work by Li, Salour, and Su surveys behavior and content-based worm detectors [32] and covers many of the works referenced here. They do not measure the performance of detectors, however, limiting their study to describing and classifying them instead.…”
Section: Related Workmentioning
confidence: 99%
“…To detect malicious traffic it require to understand normal traffic behavior, which in turn require efficient training which in real time scenario is much difficult to achieve, as the behavior of legitimate activities are largely unpredictable. Though this method is found to be effective in detecting unknown worms [4], it generates high false alarm.…”
Section: Introductionmentioning
confidence: 99%
“…Research on worm defense may be broadly classified into two categories: Detection and Containment. Further Detection algorithm can be classified into two categories; Anomaly based detection and Signature based detection [4,10].…”
Section: Introductionmentioning
confidence: 99%