A novel approach to worm detection systems

作者: Yazed B. Al-Saawy , Antonio Cau , Francois Siewe

DOI: 10.1109/SAI.2015.7237297

关键词:

摘要: Computer worms are a type of malicious malware that prey on networked machines. A number different detection mechanisms have been presented in the literature to detect worms. However, common drawback these is any failure results damaging real This study proposes new approach goes beyond currently available signature and behavior-based approaches. In contrast traditional worm system (WDS) use approaches, our proposed based by damage caused dummy machines rather than The WDS adds additional security as compared used systems allowing conduct their normal behavior host, thus protecting rest network from damage. was designed within setting capable sending receiving files messages between hosts part overall mechanism.

参考文章(28)
Blake Hartstein, Matthew Richard, Steven Adair, Michael Ligh, Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code ,(2010)
Mila Dalla Preda, Cinzia Di Giusto, Hunting Distributed Malware with the κ-Calculus Fundamentals of Computation Theory. pp. 102- 113 ,(2011) , 10.1007/978-3-642-22953-4_9
Douglas S. Reeves, Qinghua Zhang, Polymorphic and metamorphic malware detection North Carolina State University. ,(2008)
Andhika Pratama, Fauzi Adi Rafrastara, Computer Worm Classification ,(2012)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion, Behavior Abstraction in Malware Analysis Runtime Verification. ,vol. 6418, pp. 168- 182 ,(2010) , 10.1007/978-3-642-16612-9_14
Fabien Pouget, Marc Dacier, Honeypot-based forensics ,(2004)
Brian M. Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo, BotSwindler: tamper resistant injection of believable decoys in VM-based hosts for crimeware detection recent advances in intrusion detection. pp. 118- 137 ,(2010) , 10.1007/978-3-642-15512-3_7
Henk K. Diemer, Bojan Zdrnja, Michael Blanchard, Ken Bechtel, Andrew Lee, David Harley, Igor Muttik, AVIEN Malware Defense Guide for the Enterprise ,(2007)