2014
DOI: 10.5120/18169-9045
|View full text |Cite
|
Sign up to set email alerts
|

A Tour of the Computer Worm Detection Space

Abstract: Computer worm detection has been a challenging and often elusive task. This is partly because of the difficulty of accurately modeling either the normal behavior of computer networks or the malicious actions of computer worms. This paper presents a literature review on the worm detection techniques, highlighting the worm characteristics leveraged for detection and the limitations of the various detection techniques. The paper broadly categorizes the worm detection approaches into content signature based detect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The computer worm technique utilized in this experiment can infect all computers in a network after infecting a single computer [84]. During the assault, the attacker first accesses a computer in the network but with no awareness of the user and then transmits all the required files and scripts needed to infect all nodes within the consumer network [84].…”
Section: Using Cloudmonitor To Detect Remote Computer Worm Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The computer worm technique utilized in this experiment can infect all computers in a network after infecting a single computer [84]. During the assault, the attacker first accesses a computer in the network but with no awareness of the user and then transmits all the required files and scripts needed to infect all nodes within the consumer network [84].…”
Section: Using Cloudmonitor To Detect Remote Computer Worm Attacksmentioning
confidence: 99%
“…The computer worm technique utilized in this experiment can infect all computers in a network after infecting a single computer [84]. During the assault, the attacker first accesses a computer in the network but with no awareness of the user and then transmits all the required files and scripts needed to infect all nodes within the consumer network [84]. Once the initial stage has been performed, the attack will detect all the consumer's neighbor IP addresses within the network and deliver the attack payload to the "/tmp" directory of all the systems through SCP with zero knowledge from the users.…”
Section: Using Cloudmonitor To Detect Remote Computer Worm Attacksmentioning
confidence: 99%
“…A number of approaches for computer worm detection have been reviewed in the literature. These include contentbased signature schemes, anomaly-detection schemes, and behavioral-signature detection schemes, a summary and analysis of which has been presented by the authors in an earlier paper [6]. For this present work, only approaches that utilize machine learning are emphasized.…”
Section: Related Workmentioning
confidence: 99%
“…Input: Learning set-S, Ensemble size B. Output: Ensemble E (1) E = (2) W=Assign Equal Weights (S) (3) for i = 1 to B do (4) C i =Construct-Models (S, W) (5) E rr =Apply Model (C i , S) (6) if (E rr = 0) ∪ (E rr ≥ 0.5) then (7) Terminate Model Generation (8) return E (9) for j = 1 to Number Of Examples (S) do (10) if Correctly Classified (S j , C i ) then (11) W…”
Section: Stackingmentioning
confidence: 99%
“…An IDS is a monitoring infrastructure or application that surveils all events or communication traffic taking place in a computing system or over networks and generates reports to the management system by differentiating intrusions, suspicious activities, and other malicious behaviors . The term intrusion, also known as attack, is a behavior of evading computer security policy or standard , which can occur in various situations .…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%