Search Results - (( worm detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- system algorithm »
- java application »
- using algorithm »
- worm »
-
1
Intelligent failure connection algorithm for detecting internet worms
Published 2009“…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
Get full text
Get full text
Get full text
Article -
2
Improving The Algorithm To Detect Internet Worms
Published 2008“…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Intelligent signature detection for scanning Internet Worms
Published 2024Subjects:journal::journal article -
4
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
6
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
Published 2012“…Most detection algorithms used in current detection systems target only monomorphic worm payloads and offer no defence against polymorphic worms, which changes the payload dynamically. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A new generation for intelligent anti-internet worm early system detection
Published 2009“…Worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment.We propose intelligent early system detection mechanism for detecting internet worm.The mechanism is combined of three techniques: Failure Connection Detection (FCD) which concerns with detecting the internet worm and stealthy worm in which computer infected by the worm by using Artificial Immune System; and the Traffic Signature Detection (TSD) which responsible for detecting traffic signature for the worm; and the DNA Filtering Detection (DNAFD) which converts traffic signature to DNA signature and sending it to all computer that connected with the router to create a firewall for new worms.Our proposed algorithm can detect difficult stealthy internet worm in addition to detecting unknown internet worm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
-
10
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Currently, there are many works related with worm detection techniques but not much research is focusing on worm response. …”
Proceedings Paper -
11
-
12
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
Published 2013“…In this paper, we propose an accurate signature generation system for zero-day polymorphic worms. We have designed a novel Double-honeynet system, which is able to detect zero-day polymorphic worms that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Detection algorithm for internet worms scanning that used user datagram protocol
Published 2024journal::journal article -
14
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…The usage of android system is rapidly growing in mobile devices. Android system might also incur severe different malware dangers and security threats such as infections, root exploit, Trojan, and worms. …”
Get full text
Get full text
Get full text
Article -
15
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
16
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
17
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
