INTEGRATED IMPLEMENTATION OF MODELING, PROPAGATION AND DETECTION OF WORMS IN OUTBOX OF ATTACKER
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 3)Publication Date: 2015-03-30
Authors : V.B.Anitha; D.Durai kumar;
Page : 608-612
Keywords : : Network Security; Malware; Modeling; Propagation Dynamics;
Abstract
There are many critical security threats posed in the malware. Modeling their propagation dynamics and detecting the malware are the main essential for prediction of the potential damages. The malwares could cause the computer to be compromised. Malware / worms is modeled and propagated into other computers to compromise those. A new folder virus and shutdown virus are created and their behavior are analyzed and stored in the server. The user is infected in the active state. Once a user node infected it becomes compromised. It starts sending a worm file to rest of its neighbor nodes to which it is attached in the network. There is no sender end filtration of malware worm’s .In order to address this in this paper we proposed to scan the content of the mail. After analysis of the behavior of the worms patches are distributed to kill the worms. Finally the sever analyze the data if there is any malware content then they filtered at the sender end itself in order to prevent the penetration of the worms.
Other Latest Articles
- ANDROID BASED GRAPHICAL PASWORD AND PIXEL BASED PATTERN RECOGNISATION SYSTEM
- THE IMPACT OF PROCESSING ON THE NUTRITIONAL, MINERAL AND VITAMIN COMPOSITION OF CASHEW NUT
- SURVEY ON BIG DATA ANALYSIS & PROCESSING WITH DATA MINING METHODOLOGY
- ADSORPTION OF PERCHLORATE BY GFH AND GAC IN WATER
- THE COSTS AND EFFECTS OF BUILDINGS STRUCTURE FAILURES IN A DEVELOPING SOCIETY (THE NIGERIAN EXPERIENCE)
Last modified: 2015-04-08 22:44:58