2014 IEEE Conference on Communications and Network Security 2014
DOI: 10.1109/cns.2014.6997486
|View full text |Cite
|
Sign up to set email alerts
|

Detecting smart, self-propagating Internet worms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Another category is worms, which are independent malicious code that can replicate themselves and propagate through storage devices, emails, and network resources. This proliferation consumes system resources and can degrade performance, making them detectable by antivirus scanners due to their multiple copies [5].…”
Section: Different Kinds Of Malwaresmentioning
confidence: 99%
“…Another category is worms, which are independent malicious code that can replicate themselves and propagate through storage devices, emails, and network resources. This proliferation consumes system resources and can degrade performance, making them detectable by antivirus scanners due to their multiple copies [5].…”
Section: Different Kinds Of Malwaresmentioning
confidence: 99%
“…It duplicates and targets specific software files without infecting them. Worms can harm computers by consuming their resources (Li & Stafford, 2014;Singh & Singh, 2021).…”
Section: Wormmentioning
confidence: 99%
“…Internet worms have been studied in the past as early examples of SPM [53]. Detection mechanisms based on payload signatures [49], [29], [36], and fine-grained host-level network monitoring [21], [56], [33] have been proposed. Our system is designed independently of specific malware, and is more scalable compared to hostlevel monitoring.…”
Section: Related Workmentioning
confidence: 99%