Paradigmatic and Exploration of Blind Worm
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 3
Abstract
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Tarnen Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm exploration systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic. Using a comprehensive set of exploration metric s and real-world traces as background traffic, we conduct extensive performance evaluations on our proposed spectrum-based exploration scheme. The performance data clearly demonstrates that our scheme can effectively detect the C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively detecting not only the C-Worm, but traditional worms as well.
Authors and Affiliations
Yellamandaiah Gogula1, E. Jhansi Rani
A Review: Shadow Detection And Shadow Removal from Images.
Shadows appear in remote sensing images due to elevated objects. Shadows cause hindrance to correct feature extraction of image features like buildings ,towers etc. in urban areas it may also cause false color...
An Outdoor Navigation With Voice Recognition Security Application For Visually Impaired People
Blind guide is a technology in navigation systems for visually impaired people. It is designed to provide dynamic interaction and the ability to change to fit changed circumstances guided with the use of audio instructio...
Mitigating ROQ Attacks using Flow Monitoring Method
Reduction of Quality attacks is a milder form of the DOS attacks but these are more difficult to detect than the traditional flooding attacks. The goal of these attacks do-not wish to completely cut-off services an...
Electronically Steerable planer Phased Array Antenna
A planar phased-array antenna has been constructed from a 15x15 square grid of z-directed monopoles with a length of 0.475 λ, element spacing of 0.29 λ, average directivity of 20.0 dBi across all scan angles, an av...
Image Security Using Steganography And Cryptographic Techniques
Steganography is the art of hiding the fact communication is taking place, by hiding information in other information.Many different carrier file formats can be used,but digital images are the most popular beca...