LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Gadege, Venkatesh; Mamillapally, Nagaraju (2012)
Publisher: Journal of Engineering Computers & Applied Sciences
Journal: Journal of Engineering Computers & Applied Sciences
Languages: English
Types: Article
Subjects: Computer Sciences, : Self-Propagation, Behavior, Detection, Vulnerability, Algorithms

Classified by OpenAIRE into

ACM Ref: Software_OPERATINGSYSTEMS, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Computer worms have a behavior of self-propagation over the host machines and have been terrorizing the Internet for the last several years. This is due to the ability of worms to propagate in automated fashion as they continuously compromise computer on the internet. At the same time, being fully automated makes their behavior repetitious and predictable.This article presents a survey on the behavior and detection schemes of Internet worms. We first identify worm characteristics through their behavior, and then classify worm detection algorithms based on the parameters used in the algorithms. Furthermore, we analyze and compare different detection algorithms with reference to the worm characteristics by identifying the type of worms that can and cannot be detected by these schemes
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article