Computer Network Worms Propagation and its Defence Mechanisms: A Survey

作者: G. Padmavathi , S. Divya

DOI:

关键词:

摘要: Information security is one of the major concerns for military, government, civil and commercial organizations risk has been immensely raised on internet access. Self-duplicating, self-propagating malicious codes known as worms spread themselves without any human interaction launch most destructive attacks against networks cause high risks. Increasing threats from in network continue to be a challenging task detect handle. Various exist affecting communication different worm handling mechanisms exists handle threat created by them. Considering features metrics existing detection containment network, this paper surveys classification several defence mechanism those network.

参考文章(15)
Andhika Pratama, Fauzi Adi Rafrastara, Computer Worm Classification ,(2012)
Guofei Gu, M. Sharif, Xinzhou Qin, D. Dagon, Wenke Lee, G. Riley, Worm detection, early warning and response based on local victim information annual computer security applications conference. pp. 136- 145 ,(2004) , 10.1109/CSAC.2004.51
Burak Bayoğlu, İbrahim Soğukpınar, Graph based signature classes for detecting polymorphic worms via content analysis Computer Networks. ,vol. 56, pp. 832- 844 ,(2012) , 10.1016/J.COMNET.2011.11.007
Robert Moskovitch, Yuval Elovici, Lior Rokach, Detection of unknown computer worms based on behavioral classification of the host Computational Statistics & Data Analysis. ,vol. 52, pp. 4544- 4566 ,(2008) , 10.1016/J.CSDA.2008.01.028
Byungseung Kim, Hyogon Kim, Saewoong Bahk, None, FDF: Frequency detection-based filtering of scanning worms Computer Communications. ,vol. 32, pp. 847- 857 ,(2009) , 10.1016/J.COMCOM.2008.12.010
Yuanyuan Zeng, Xin Hu, Haixiong Wang, Kang G. Shin, Abhijit Bose, Containment of network worms via per-process rate-limiting Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08. pp. 14- ,(2008) , 10.1145/1460877.1460895
Nir Nissim, Robert Moskovitch, Lior Rokach, Yuval Elovici, Detecting unknown computer worm activity via support vector machines and active learning Pattern Analysis and Applications. ,vol. 15, pp. 459- 475 ,(2012) , 10.1007/S10044-012-0296-4
Chao Chen, Zesheng Chen, Yubin Li, Characterizing and defending against divide-conquer-scanning worms Computer Networks. ,vol. 54, pp. 3210- 3222 ,(2010) , 10.1016/J.COMNET.2010.06.010
Wei Yu, Xun Wang, Adam Champion, Dong Xuan, David Lee, On detecting active worms with varying scan rate Computer Communications. ,vol. 34, pp. 1269- 1282 ,(2011) , 10.1016/J.COMCOM.2010.10.014
B. Stephenson, B. Sikdar, A Quasi-Species Model for the Propagation and Containment of Polymorphic Worms IEEE Transactions on Computers. ,vol. 58, pp. 1289- 1296 ,(2009) , 10.1109/TC.2009.63