Search Results - (( worm detection ((a algorithm) OR (_ algorithm)) ) OR ( botnet detection system algorithm ))
Search alternatives:
- system algorithm »
- a algorithm »
- worm »
-
1
-
2
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
3
Improving The Algorithm To Detect Internet Worms
Published 2008“…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Intelligent failure connection algorithm for detecting internet worms
Published 2009“…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
Get full text
Get full text
Get full text
Article -
5
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
6
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
Intelligent signature detection for scanning Internet Worms
Published 2024Subjects:journal::journal article -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Server scanning worm detection by using intelligent failure connection algorithm
Published 2010“…Our proposal decreases the false alarm in Intelligent Failure Connection Algorithm (IFCA). Our proposal also works when the computer is infected by the worm and IFCDA detected the worm, many computers that are connected through the internet will receive the warning by using our proposal. …”
Get full text
Get full text
Get full text
Article -
10
-
11
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
12
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Subjects:Conference Paper -
13
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…The proposed technique aims to detect Botnet zero-day attack in real time. This technique applies a backpropagation algorithm to the CTU-13 dataset to train and evaluate the Botnet detection classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Botnet detection using automated script / Norfathin Rosli
Published 2020“…This paper is about a Botnet Detection using Automated Script, the programming language is and the operating system is Windows 7. …”
Get full text
Get full text
Thesis -
15
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Currently, there are many works related with worm detection techniques but not much research is focusing on worm response. …”
Proceedings Paper -
16
Server scanning worm detection by using intelligent failure connection algorithm
Published 2024Article -
17
A new generation for intelligent anti-internet worm early system detection
Published 2009“…Worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment.We propose intelligent early system detection mechanism for detecting internet worm.The mechanism is combined of three techniques: Failure Connection Detection (FCD) which concerns with detecting the internet worm and stealthy worm in which computer infected by the worm by using Artificial Immune System; and the Traffic Signature Detection (TSD) which responsible for detecting traffic signature for the worm; and the DNA Filtering Detection (DNAFD) which converts traffic signature to DNA signature and sending it to all computer that connected with the router to create a firewall for new worms.Our proposed algorithm can detect difficult stealthy internet worm in addition to detecting unknown internet worm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
Published 2012“…Anomaly detection systems can detect unknown worms but usually suffer from a high false alarm rate. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
