Detection of traditional and new types of Malware using Host-based detection scheme
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
In this paper, we have discussed many traditional and new types of worms including c-worms also-worms stands for camouflaging worms because of its nature of self propagating and hiding nature. An active worm refers to a malicious software program that propagates itself on the Internet to infect other computers. The propagation of the worm is based on exploiting vulnerabilities of computers on the Internet. This paper also shows the working of various worms and their detection system. These detection techniques not only detect worms but also detect various malware attacks.
Authors and Affiliations
Satish N. Chalurkar , Dr. B. B. Meshram
Overview Of Video Condensation In Streaming Video
proficient browsing of long video series a main tool in video surveillance. Example: for earlier event video forensics, but can also be used for quick review of moving pictures and home videos. Since there are ma...
Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks
Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not wor...
Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches
Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats t...
750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program
This paper presents the electrical system for 750kv transmission line and also that have been built throughout the world to operate above 700kv.This paper is provides information of system planning, design and programmin...
A Dynamic Approach to Optimize Energy in RIP, OLSR and Fisheye Routing Protocols using Simulator
Energy optimization is an essential issue in wireless sensor network that consumes less energy to give optimum performance under low battery power, limited bandwidth and network life time of each node. In this paper, fir...