ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

INTEGRATED IMPLEMENTATION OF MODELING, PROPAGATION AND DETECTION OF WORMS IN OUTBOX OF ATTACKER

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 3)

Publication Date:

Authors : ; ;

Page : 608-612

Keywords : : Network Security; Malware; Modeling; Propagation Dynamics;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

There are many critical security threats posed in the malware. Modeling their propagation dynamics and detecting the malware are the main essential for prediction of the potential damages. The malwares could cause the computer to be compromised. Malware / worms is modeled and propagated into other computers to compromise those. A new folder virus and shutdown virus are created and their behavior are analyzed and stored in the server. The user is infected in the active state. Once a user node infected it becomes compromised. It starts sending a worm file to rest of its neighbor nodes to which it is attached in the network. There is no sender end filtration of malware worm’s .In order to address this in this paper we proposed to scan the content of the mail. After analysis of the behavior of the worms patches are distributed to kill the worms. Finally the sever analyze the data if there is any malware content then they filtered at the sender end itself in order to prevent the penetration of the worms.

Last modified: 2015-04-08 22:44:58