{"title":"An Investigation Towards Worms Detection Approaches over Network","authors":"Mohammed Anbar, A. Manasrah","doi":"10.1109/UKSIM.2011.57","DOIUrl":null,"url":null,"abstract":"Nowadays, worms and other outside threats in the network recognized to be a serious and unexpected behavior. The main issue was addressed based on the behavioral patterns of worms that reflect application communications typical of worms. This representation of worm's behavior differs from those used in contemporary enterprise postures, which reliance on a particular type of signature-based intrusion detection and the behavioral detection approach contrasts from this form of signature-based detection. Thus, this paper introduced the traditional worm's detection approaches. Meanwhile, the paper suggested a worm detection approach based on worm behaviors that consist on network scanning detection approach, network worm's correlation approach, and signature correlation approach.","PeriodicalId":161995,"journal":{"name":"2011 UkSim 13th International Conference on Computer Modelling and Simulation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 UkSim 13th International Conference on Computer Modelling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UKSIM.2011.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Nowadays, worms and other outside threats in the network recognized to be a serious and unexpected behavior. The main issue was addressed based on the behavioral patterns of worms that reflect application communications typical of worms. This representation of worm's behavior differs from those used in contemporary enterprise postures, which reliance on a particular type of signature-based intrusion detection and the behavioral detection approach contrasts from this form of signature-based detection. Thus, this paper introduced the traditional worm's detection approaches. Meanwhile, the paper suggested a worm detection approach based on worm behaviors that consist on network scanning detection approach, network worm's correlation approach, and signature correlation approach.