IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Early Worm Detection for Minimizing Damage in E-Service Networks

Early Worm Detection for Minimizing Damage in E-Service Networks
View Sample PDF
Author(s): Tarek Sobh (University of Bridgeport, USA)and Heba Z. El-Fiqi (Zagazig University, Egypt)
Copyright: 2011
Pages: 23
Source title: Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements
Source Author(s)/Editor(s): Abid Thyab Al Ajeeli (University of Bahrain, Bahrain)and Yousif A. Latif Al-Bastaki (University of Bahrain, Bahrain)
DOI: 10.4018/978-1-61520-789-3.ch027

Purchase

View Early Worm Detection for Minimizing Damage in E-Service Networks on the publisher's website for pricing and purchasing information.

Abstract

One of the most powerful weapons for attackers is the Internet worm. Specifically, a worm attacks vulnerable computer systems and employs self-propagating methods to flood the Internet rapidly. Since a “Worm” is self-propagated through the connected network, it doesn’t need human interaction or file transmission to replicate itself. It spreads in minutes; Slammer worms infect about 75,000 nodes through the internet in about 10 minutes. Since most of antivirus programs detect viruses based on their signature, then this approach can’t detect new viruses or worms till being updated with their signature, which can’t be known unless some systems had already been infected. This highlights worms are still on the top of malware threats attacking computer systems, although the evolution of worms detection techniques. Early detection of unknown worms is still a problem. This chapter produce a method for detecting unknown worms based on local victim information. The proposed system uses Artificial Neural Network (ANN) for classifying worm/ nonworm traffic and predicting the percentage of infection in the infected network. This prediction can be used to support decision making processes for network administrators to respond quickly to worm propagation in an accurate procedure.

Related Content

. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
Body Bottom