2020
DOI: 10.14704/web/v17i2/web17038
|View full text |Cite
|
Sign up to set email alerts
|

Review Study on Different Attack Strategies of Worm in a Network

Abstract: In today’s era Internet worm is a giant threat to the network infrastructure. Although there are different strategies to sense those hazard at early stages. They detect using some signature based approach. But when novel attacks come into the structure, it is very hard to detect them as they do not have any previous signature. For those some signature based methodology is used. In our work we have reviewed different strategies of internet worm detection and prevention and this article also explores the existin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Since machine learning algorithms can find patterns in the data, learning new patterns and acts appropriately, this could be used to develop adaptable access control. Baris Yuce and Yacine Rezgui used ANN and genetic algorithm to provide adaptability [26] [27]. Recursive neural Network and deep learning concepts are also used for rule extraction [28].…”
Section: Machine Learningmentioning
confidence: 99%
“…Since machine learning algorithms can find patterns in the data, learning new patterns and acts appropriately, this could be used to develop adaptable access control. Baris Yuce and Yacine Rezgui used ANN and genetic algorithm to provide adaptability [26] [27]. Recursive neural Network and deep learning concepts are also used for rule extraction [28].…”
Section: Machine Learningmentioning
confidence: 99%