SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                           International Journal of Advanced Research in Computer Engineering & Technology
                                                                               Volume 1, Issue 4, June 2012




   Detection of traditional and new types of
  Malware using Host-based detection scheme
                                       Satish N.Chalurkar1, Dr.B.B.Meshram2
                                         1
                                         Computer Department,VJTI,Mumbai
                                             1
                                              satishchalurkar1@gmail.com


                                   2
                                    Head of Computer Department,VJTI,Mumbai
                                                 2
                                                  bbmeshram@vjti.org.in


Abstract--- In this paper, we have discussed many                 What makes them so deadly and unidentifiable is
traditional and new types of worms including c-
                                                                  the way they reach your PC and go unnoticed under
worms also-worms stands for camouflaging worms
because of its nature of self propagating and hiding              the camouflage of reliable software. Most of the
nature. An active worm refers to a malicious software             advertisers banking on adware use third party
program that propagates itself on the Internet to                 software bundles to pack their adware in. Since
infect other computers. The propagation of the worm               people want to install these software, they also end
is based on exploiting vulnerabilities of computers on
                                                                  up installing the adware.
the Internet. This paper also shows the working of
various worms and their detection system. These                   Malware also use rootkits to manipulate the
detection techniques not only detect worms but also
                                                                  operating system. What they do is make changes
detect various malware attacks.
                                                                  such that they are not identified on the Task
                                                                  Manager Panel. So in essence your PC might run
Keywords--- active worms, c-worms, host based
detection system, network based detection system,                 evidently slow, you still can’t see the applications
types of worms                                                    running in the back ground and thus give malware
                                                                  ample time to spread to all the roots.
                                                                  Malware can be roughly broken down into types
                      I.     INTRODUCTION
                                                                  according to the malware's method of operation.
Malware can infect systems by being bundled with                  Anti-"virus" software, despite its name, is able to
other programs or attached as macros to files.                    detect all of these types of malware.
Others are installed by exploiting a known
vulnerability in an operating system (OS), network
device, or other software, such as a hole in a
browser that only requires users to visit a website               An active worm refers to a malicious software
to infect their computers. The vast majority,                     program that propagates itself on the Internet to
however, are installed by some action from a user,                infect other computers. The propagation of the
such as clicking an e-mail attachment or                          worm is based on exploiting vulnerabilities of
downloading a file from the Internet.                             computers on the Internet.
Some of the more commonly known types of
malware are viruses, worms, Trojans, bots, back                   “A worm is a program that can run by itself and
doors, spyware, and adware. Damage from                           can propagate a fully working version of itself to
malware varies from causing minor irritation (such                other machines. It is derived from the word
as browser popup ads), to stealing confidential                   tapeworm, a parasitic organism that lives inside a
information or money, destroying data, and
                                                                  host and saps its resources to maintain itself.”
compromising and/or entirely disabling systems
and networks.
                                                                  The worm used an interesting hook-and-haul
Malware cannot damage the physical hardware of                    method of propagation that masked its entrance to a
systems and network equipment, but it can damage                  site and kept its mechanisms secret. It was also
the data and software residing on the equipment.                  multifaceted and multi-architecture, using multiple
Malware should also not be confused with                          methods to gain entrance to a machine and
defective software, which is intended for legitimate              affecting two entirely different computer
purposes but has errors or bugs.                                  architectures. It had an intensely computational part

                                                                                                                  341

                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                            Volume 1, Issue 4, June 2012



that was meant to give it resilience through the            financial,   transportation, and government
ability to infiltrate through many user accounts, but       institutions and precluding any human-based
it had an ineffective mechanism to limit its growth         response[2].
rate.

Particularly, the epidemic dynamic model assumes            Slammer’s most novel feature is its propagation
that any given computer is in one of the following          speed. In approximately three minutes, the worm
states:                                                     achieved its full scanning rate (more than 55
 immune, vulnerable, or infected. An immune                million scans per second), after which the growth
     computer is one that cannot be infected by a           rate slowed because significant portions of the
     worm;                                                  network      had      insufficient   bandwidth     to
                                                            accommodate more growth.
   a vulnerable computer is one that has the
                                                            The worm’s spreading strategy uses random
    potential of being infected by a worm;
                                                            scanning-it randomly selects IP addresses,
                                                            eventually finding and infecting all susceptible
    an infected computer is one that has been
                                                            hosts. Random-scanning worms initially spread
     infected by a worm.
                                                            exponentially, but their rapid new-host infection
In this paper,Section II described various types of
                                                            slows as the worms continually retry infected or
worms and the details of active worms.Active
                                                            immune addresses. Thus, as with the Code Red
worms are those that infect system.Section III
                                                            worm, Slammer’s infected-host proportion follows
described c-worms and various detection
                                                            a classic logistic form of initial exponential growth
system.Section IV contain conclusion.
                                                            in a finite system.it label this growth behaviour a
                                                            random constant spread (RCS) model.

                  II.    RELATED WORK                       While Slammer spread nearly two orders of
                                                            magnitude faster than Code Red, it probably
A. Types of worms                                           infected fewer machines. Both worms use the same
                                                            basic scanning strategy to find vulnerable machines
Many real-world worms have caused notable                   and transfer their exploitive payloads; however,
damage on the Internet. These worms include                 they differ in their scanning constraints. While
“Code-Red” worm, “Slammer” worm, and “Witty”/               Code Red is latency-limited, Slammer is
“Sasser” worms. Many active worms are used to               bandwidth-limited, enabling Slammer to scan as
                                                            fast as a compromised computer can transmit
infect a large number of computers and recruit              packets or a network can deliver them.
them as bots or zombies, which are networked
together to form botnets.
                                                            3) Sobig Worms
1) Slapper Worms
Slapper would attempt to remotely compromise                Like its predecessors, Sobig.E is unremarkable in
                                                            many ways. It’s a piece of malicious code that
systems by randomly selecting a network to scan
                                                            targets Microsoft Windows operating systems.
and doing a sequential sweep of all IP addresses in         Written in Microsoft Visual C++, it makes use of
the network while looking for vulnerable Web                threads, its executable is compressed with either
servers.                                                    UPX or TeLock, it collects email addresses by
The Slapper worm’s P2P communications protocol              harvesting files (such as Windows Address Book
was designed to be used by a hypothetical client to         [WAB], Outlook Express mailbox [DBX], HTM,
send commands to and receive responses from an              HTML, Mail message [EML], or text [TXT]), and
                                                            attempts to infect new systems by sending them an
infected host (a node). In this way, the client can
                                                            infected email message or by copying itself to an
perform several different actions while hiding its          open network share. The worm also includes its
network location and making communications                  own simple mail transport protocol (SMTP) engine,
more difficult to monitor[1].                               spoofs its emails’ source address, encrypts and
                                                            decrypts text strings as needed, and creates a
2) Slammer Worms                                            mutual exclusion object (mutex) on infected
Slammer (sometimes called Sapphire) was the                 systems to ensure they are not infected more than
                                                            once.
fastest computer worm in history. As it began
spreading throughout the Internet, the worm
infected more than 90 percent of vulnerable hosts
within 10 minutes, causing significant disruption to

                                                                                                            342

                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                            Volume 1, Issue 4, June 2012



4) Morris Worms                                             • It spread through a population almost an order of
                                                            magnitude smaller than that of previous worms,
   It attacked one operating system, but two               demonstrating worms’ viability as an automated
    different computer architectures.                       mechanism to rapidly compromise machines on the
   It had three distinct propagation vectors.              Internet, even in niches without a software
   It had several mechanisms for finding both              monopoly.
    potential nodes to infect, particularly
    information about the local system’s IP                 B. Active Worms
    connectivity (its network class and gateway),
    and information found in user accounts.                 Active worms are similar to biological viruses in
   It traversed trusted accounts using password            terms of their infectous and self-propagating
    guessing.                                               nature. They identify vulnerable computers, infect
   The worm made heavy use of this                         them and the worm-infected computers propagate
    computationally       intensive    method     by        the infection further to other vulnerable computers.
    employing four information sources: accounts            In order to understand worm behavior, we first
    with null passwords (no password),                      need to model it. Active worms use various scan
    information related to the user account, an             mechanisms to propagate themselves efficiently.
    internal dictionary, and a word list on the local
    machines, /usr/dict/words.                              The basic form of active worms can be categorized
   It installed its software via a two-step “hook          as having the Pure Random Scan (PRS) nature. In
    and haul” method (explained later in the                the PRS form, a worm-infected computer
    “Inside the worm” subsection) that required the         continuously scans a set of random Internet IP
    use of a C compiler, link loader, and a callback        addresses to find new vulnerable computers. Other
    network connection to the infecting system.             worms propagate themselves more effectively than
   It evaded notice by obscuring the process               PRS worms using various methods, e.g., network
    parameters and rarely leaving files behind.             port scanning, email, file sharing, Peer-to-Peer
   It attempted to limit the reinfection rate on           (P2P) networks, and Instant Messaging (IM). In
    each node (but not the total number).                   addition, worms usedifferent scan strategies during
   It attempted to run forever on as many nodes            different stages of propagation.In order to increase
    as possible.                                            propagation efficiency, they use a local network or
                                                            hitlist to infect previously identified vulnerable
     Although there had been worms before, no one           computers at the initial stage of propagation.
had tried to run one on a complex topology. For
this worm to achieve its purpose of widespread              They may also use DNS, network topology and
propagation, it had to discover local topology in an        routing information to identify active computers
arbitrary graph[7].                                         instead of randomly scanning IP addresses.They
                                                            split the target IP address space during propagation
5) Witty Worms                                              in order to avoid duplicate scans. Li et al. studied a
                                                            divide-conquer scanning technique that could
While the Witty worm is only the latest in a string         potentially spread faster and stealthier than a
of self-propagating remote exploits, it distinguishes       traditional random-scanning worm. Ha et al.
itself through several interesting features:                Formulated the problem of finding a fast and
                                                            resilient propagation topology and propagation
• It was the first widely propagated Internet worm          schedule for Flash worms. Yang et al. studied the
to carry a destructive payload.                             worm propagation over the sensor networks.

• It started in an organized manner with an order of
magnitude more ground-zero hosts than any                                   III.   PROPOSED TOOL FOR
previous worm.                                                                     MALWARE DETECTION

• It represents the shortest known interval                 A. C-Worm
between vulnerability disclosure and worm
release—it began spreading the day after the ISS            The C-Worm camouflages its propagation by
vulnerability was publicized.                               controlling scan traffic volume during its
                                                            propagation. The simplest way to manipulate scan
• It spread through a host population in which every        traffic volume is to randomly change the number of
compromised host was proactive in securing its              worm instances conducting port-scans.
computer and networks.
                                                            As other alternatives, a worm attacker may use an
                                                            open-loop control (non-feedback) mechanism by

                                                                                                             343

                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                           Volume 1, Issue 4, June 2012



choosing a randomized and time related pattern for         distribution of destination addresses. Other works
the scanning and infection in order to avoid being         study worms that attempt to take on new patterns to
detected. Nevertheless, the open-loop control              avoid detection[10] .
approach raises some issues of the invisibility of
the attack.                                                Here are some of the techniques for identifying the
                                                           worms in the host or in the networks.
First, as we know, worm propagation over the
Internet can be considered a dynamic system.               1) Distributing sensors
When an attacker launches worm propagation, it is
very challenging for the attacker to know the              Determining the number and strategic placement of
accurate parameters for worm propagation                   distributed sensors (for example, at an enclave’s
dynamics over the Internet.
                                                           gateway, at an upstream peering point, or both) for
Consequently, the overall worm scan traffic                a particular-size enclavemaximizes coverage and
volume in the open-loop control system will expose         minimizes communication cost and time to detect
a much higher probability to show an increasing            propagations and attack precursors.
trend with the progress of worm propagation. As
more and more computers get infected, they, in             2) Inferring intent
turn, take part in scanning other computers. Hence,
we consider the Cworm as a worst case attacking            The relationships among common targeted victims
scenario that uses a closedloop control for                suggest what a scanning source’s intent might be.
regulating the propagation speed based on the              For example, a common source of stealthy
feedback propagation statuseasy way to comply              scanning from an attacking IP address directed
with the conference paper formatting requirements
is to use this document as a template and simply           toward a set of unrelated victims appears
type your text into it[10].                                fundamentally different than an attacker scanning a
                                                           set of IP addresses all owned by, say, several
                                                           different banks.
B. Existing Detection System
                                                           3) Profiling behavior.
1) Host Based Detection System
                                                           A longitudinal study of attacker behavior and intent
Worm detection has been intensively studied in the         and their attacks against victims provide sufficient
past and can be generally classified into two              repeated behavior to accurately predict future
categories: “host-based” detection and “network-
                                                           attack steps.
based” detection.
                                                           4) Classifying activities
Host-based detection systems detect worms by
monitoring, collecting, and analyzing worm
                                                           We need a way to quickly classify worms and scan
behaviors on end hosts.Since worms are malicious
programs that execute on these computers,                  or probe activity into useful clusters and profiles
analyzing the behavior of worm executables plays           according to their characteristics (destination ports,
an important role in host based detection systems.         interprobe delay, and payload length, for example)
                                                           and behaviour.
2) Network Based Detection System

In contrast, network-based detection systems detect        C. Proposed Detection Scheme
worms primarily by monitoring, collecting, and
analyzing the scan traffic (messages to identify           There are three existing system to detect the worms
vulnerable computers) generated by worm attacks.           as well as malware attack.
Network-based detection schemes commonly
analyze the collected scanning traffic data by             The first scheme is the volume mean-based
applying certain decision rules for detecting the          (MEAN) detection scheme which uses mean of
worm propagation. For example,Venkataraman et              scan traffic to detect worm propagation; the second
al. and Wu et al. in proposed schemes to examine           scheme is the trend-based (TREND) detection
statistics of scan traffic volume, Zou et al.              scheme which uses the increasing trend of scan
presented a trend-based detection scheme to                traffic to detect worm propagation; and the third
examine the exponential increase pattern of scan           scheme is the victim number variance based (VAR)
traffic , Lakhina et al proposed schemes to examine        detection scheme which uses the variance of the
other features of scan traffic, such as the                scan traffic to detect worm propagation.

                                                                                                            344

                                      All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                            Volume 1, Issue 4, June 2012




The C-Worm adapts their propagation traffic                 Recall that the C-Worm goes undetected by
patterns in order to reduce the probability of              detection schemes that try to determine the worm
detection, and to eventually infect more computers.         propagation only in the time domain. Instead of
The C-Worm is different from polymorphic worms              time domain,frequency domain is used to detect the
that deliberately change their payload signatures           c worms as well as traditional worms.
during propagation.                                         The user give file to the scan block.It has to
                                                            option,either it scan sequentially or it can
1) Architecture of Detection Tool:                          randomly.For each file,it calculate value using the
                                                            Fourier Transform.At every time,the file is
                                                            scan,that value is compared with Window sliding
                                                            number.if value of that file that is to be scanned are
                                                            greater than WSN then it detect as malware
                                                            otherwise it shows non-detection of malware.If the
                                                            malware is found then analysis the malware and
                                                            prepare the chart for that analysis.
                                                            Notice that the frequency domain analysis will
                                                            require more samples in comparison with the time
                                                            domain analysis,since the frequency domain
                                                            analysis technique such as the Fourier transform,
                                                            needs to derive power spectrum amplitude for
                                                            different frequencies.
       Fig 1:Architecture of detection Tool
                                                            When we scan system,first it will take the single
The above diagram shows the architecture of                 file and then generates its number using fourier
detection tool.The First block take the file to read        transform.if that number is larger than the number
then it passed to detection tool block which contain        which are gererated from the window sliding
the various block that shown in below diagram then          number then it will shows that worms or malware
it finally generate the report.                             is detected.
The flow of above architecture are given
below,which are also proposed in the paper.                 It will not only scan sequential but also randomly
                                                            because of its nature of self propogation in different
                                                            location in the system.

                                                                               IV.     CONCLUSION

                                                            In this paper, we studied a new class of smart-
                                                            worm called CWorm,which has the capability to
                                                            camouflage its propagation and further avoid the
                                                            detection. It showed that, although the C-Worm
                                                            successfully camouflages its propagation in the
                                                            time domain, its camouflaging nature inevitably
                                                            manifests as a distinct pattern in the frequency
                                                            domain. Based on observation, we creates Host-
                                                            based detection scheme to detect the C-Worm.




                                                                                                             345

                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012



                REFERENCES                             ON   DEPENDABLE         AND     SECURE
                                                       COMPUTING ,VOL. 8, NO. 3, MAY-JUNE 2011

[1] IVAN ARCE,ELIAS LEVY ,” An Analysis of             [11] Zhenhai Duan, Peng Chen, Fernando Sanchez
the Slapper Worm”.                                     ,Yingfei Dong ,Mary Stephenson, James Barker”
                                                       Detecting Spam Zombies by Monitoring Outgoing
[2] DAVID MOORE, VERN PAXSON,” Inside                  Messages”
the Slammer Worm”
                                                       [12]Yanfang Ye, Tao Li, Qingshan Jiang, and
[3] ELIAS LEVY,” The Making of a Spam Zombie           Youyu Wang” CIMDS: Adapting Postprocessing
Army”                                                  Techniques of Associative Classification for
                                                       Malware Detection”
[4] Yong Tang, Bin Xiao, Member, IEEE, and
Xicheng Lu” Signature Tree Generation for              [13] Carlos Raniery P. dos Santos, Rafael Santos
Polymorphic Worms”, IEEE TRANSACTIONS                  Bezerra, Joao Marcelo Ceron,” Botnet Master
ON COMPUTERS, VOL. 60, NO. 4, APRIL 2011               Detection Using a Mashup-based Approach”

[5] Wei Yu, Member, IEEE, Nan Zhang, Member,           [14] Zongqu Zhao” A Virus Detection Scheme
IEEE, Xinwen Fu, Member, IEEE, and Wei Zhao,           Based on Features of Control Flow Graph”
Fellow, IEEESelf-Disciplinary Worms and
Countermeasures: Modeling and Analysis”, IEEE          [15] Mohamad Fadli Zolkipli Aman Jantan “An
TRANSACTIONS ON PARALLEL AND                           Approach for Malware Behavior Identification and
DISTRIBUTED SYSTEMS, VOL. 21, NO. 10,                  Classification”
OCTOBER 2010
                                                       [16] M. Shankarapani, K. Kancherla, S.
[6] Yong Tang and Shigang Chen,” An Automated          Ramammoorthy, R. Movva, and S. Mukkamala
Signature-Based Approach against Polymorphic           “Kernel Machines for Malware Classification and
Internet Worms” IEEE TRANSACTIONS ON                   Similarity Analysis”
PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 18, NO. 7, JULY 2007                              [17] Felix Leder, Bastian Steinbock, Peter
                                                       Martini“Classification  and    Detection      of
[7] HILARIE ORMAN,” The Morris Worm: A                 Metamorphic Malware using Value Set Analysis”
Fifteen-Year Perspective”
                                                       [18] Desmond Lobo, Paul Watters and Xinwen Wu
[8] Guanhua Yan and Stephan Eidenbenz,”                “RBACS: Rootkit Behavioral Analysis and
Modeling Propagation Dynamics of Bluetooth             Classification System”
Worms       (Extended   Version)”,   IEEE
TRANSACTIONS ON MOBILE COMPUTING,                      [19] Siddiqui M.A.:” Data Mining Methods for
VOL. 8, NO. 3, MARCH 2009                              Malware Detection.”

[9] SALVATORE J. STOLFO,” Worm and Attack              [20] Moskovitch R, Feher, Tzachar N, Berger E,
Early Warning”                                         Gitelman M, Dolev S,et al.” Unknown malcode
                                                       detection using OPCODE representation. “
[10] Wei Yu, Xun Wang, Prasad Calyam, Dong
Xuan, and Wei Zhao," Modeling and Detection of         [21]Michael Erbschloe “A Computer Security
Camouflaging Worm”, IEEE TRANSACTIONS                  Professional’s   Guide    to     Malicious.




                                                                                                   346

                                  All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
An approach to containing computer viruses
An approach to containing computer virusesAn approach to containing computer viruses
An approach to containing computer virusesUltraUploader
 
Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File InclusionImperva
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 

Tendances (20)

Virus
VirusVirus
Virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Mitppt
MitpptMitppt
Mitppt
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
An approach to containing computer viruses
An approach to containing computer virusesAn approach to containing computer viruses
An approach to containing computer viruses
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File Inclusion
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
computer security
computer securitycomputer security
computer security
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Modern Malware and Threats
Modern Malware and ThreatsModern Malware and Threats
Modern Malware and Threats
 

Similaire à 341 346

Paper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfPaper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfRishikhesanALMuniand
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...IOSR Journals
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
System Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSystem Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSouma Maiti
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesSolomon Sunday Oyelere
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516Yasser Mohammed
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 

Similaire à 341 346 (20)

Paper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfPaper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdf
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
H0434651
H0434651H0434651
H0434651
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
System Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSystem Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITY
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virus
VirusVirus
Virus
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Information security
Information securityInformation security
Information security
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

341 346

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Detection of traditional and new types of Malware using Host-based detection scheme Satish N.Chalurkar1, Dr.B.B.Meshram2 1 Computer Department,VJTI,Mumbai 1 satishchalurkar1@gmail.com 2 Head of Computer Department,VJTI,Mumbai 2 bbmeshram@vjti.org.in Abstract--- In this paper, we have discussed many What makes them so deadly and unidentifiable is traditional and new types of worms including c- the way they reach your PC and go unnoticed under worms also-worms stands for camouflaging worms because of its nature of self propagating and hiding the camouflage of reliable software. Most of the nature. An active worm refers to a malicious software advertisers banking on adware use third party program that propagates itself on the Internet to software bundles to pack their adware in. Since infect other computers. The propagation of the worm people want to install these software, they also end is based on exploiting vulnerabilities of computers on up installing the adware. the Internet. This paper also shows the working of various worms and their detection system. These Malware also use rootkits to manipulate the detection techniques not only detect worms but also operating system. What they do is make changes detect various malware attacks. such that they are not identified on the Task Manager Panel. So in essence your PC might run Keywords--- active worms, c-worms, host based detection system, network based detection system, evidently slow, you still can’t see the applications types of worms running in the back ground and thus give malware ample time to spread to all the roots. Malware can be roughly broken down into types I. INTRODUCTION according to the malware's method of operation. Malware can infect systems by being bundled with Anti-"virus" software, despite its name, is able to other programs or attached as macros to files. detect all of these types of malware. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a hole in a browser that only requires users to visit a website An active worm refers to a malicious software to infect their computers. The vast majority, program that propagates itself on the Internet to however, are installed by some action from a user, infect other computers. The propagation of the such as clicking an e-mail attachment or worm is based on exploiting vulnerabilities of downloading a file from the Internet. computers on the Internet. Some of the more commonly known types of malware are viruses, worms, Trojans, bots, back “A worm is a program that can run by itself and doors, spyware, and adware. Damage from can propagate a fully working version of itself to malware varies from causing minor irritation (such other machines. It is derived from the word as browser popup ads), to stealing confidential tapeworm, a parasitic organism that lives inside a information or money, destroying data, and host and saps its resources to maintain itself.” compromising and/or entirely disabling systems and networks. The worm used an interesting hook-and-haul Malware cannot damage the physical hardware of method of propagation that masked its entrance to a systems and network equipment, but it can damage site and kept its mechanisms secret. It was also the data and software residing on the equipment. multifaceted and multi-architecture, using multiple Malware should also not be confused with methods to gain entrance to a machine and defective software, which is intended for legitimate affecting two entirely different computer purposes but has errors or bugs. architectures. It had an intensely computational part 341 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 that was meant to give it resilience through the financial, transportation, and government ability to infiltrate through many user accounts, but institutions and precluding any human-based it had an ineffective mechanism to limit its growth response[2]. rate. Particularly, the epidemic dynamic model assumes Slammer’s most novel feature is its propagation that any given computer is in one of the following speed. In approximately three minutes, the worm states: achieved its full scanning rate (more than 55  immune, vulnerable, or infected. An immune million scans per second), after which the growth computer is one that cannot be infected by a rate slowed because significant portions of the worm; network had insufficient bandwidth to accommodate more growth.  a vulnerable computer is one that has the The worm’s spreading strategy uses random potential of being infected by a worm; scanning-it randomly selects IP addresses, eventually finding and infecting all susceptible  an infected computer is one that has been hosts. Random-scanning worms initially spread infected by a worm. exponentially, but their rapid new-host infection In this paper,Section II described various types of slows as the worms continually retry infected or worms and the details of active worms.Active immune addresses. Thus, as with the Code Red worms are those that infect system.Section III worm, Slammer’s infected-host proportion follows described c-worms and various detection a classic logistic form of initial exponential growth system.Section IV contain conclusion. in a finite system.it label this growth behaviour a random constant spread (RCS) model. II. RELATED WORK While Slammer spread nearly two orders of magnitude faster than Code Red, it probably A. Types of worms infected fewer machines. Both worms use the same basic scanning strategy to find vulnerable machines Many real-world worms have caused notable and transfer their exploitive payloads; however, damage on the Internet. These worms include they differ in their scanning constraints. While “Code-Red” worm, “Slammer” worm, and “Witty”/ Code Red is latency-limited, Slammer is “Sasser” worms. Many active worms are used to bandwidth-limited, enabling Slammer to scan as fast as a compromised computer can transmit infect a large number of computers and recruit packets or a network can deliver them. them as bots or zombies, which are networked together to form botnets. 3) Sobig Worms 1) Slapper Worms Slapper would attempt to remotely compromise Like its predecessors, Sobig.E is unremarkable in many ways. It’s a piece of malicious code that systems by randomly selecting a network to scan targets Microsoft Windows operating systems. and doing a sequential sweep of all IP addresses in Written in Microsoft Visual C++, it makes use of the network while looking for vulnerable Web threads, its executable is compressed with either servers. UPX or TeLock, it collects email addresses by The Slapper worm’s P2P communications protocol harvesting files (such as Windows Address Book was designed to be used by a hypothetical client to [WAB], Outlook Express mailbox [DBX], HTM, send commands to and receive responses from an HTML, Mail message [EML], or text [TXT]), and attempts to infect new systems by sending them an infected host (a node). In this way, the client can infected email message or by copying itself to an perform several different actions while hiding its open network share. The worm also includes its network location and making communications own simple mail transport protocol (SMTP) engine, more difficult to monitor[1]. spoofs its emails’ source address, encrypts and decrypts text strings as needed, and creates a 2) Slammer Worms mutual exclusion object (mutex) on infected Slammer (sometimes called Sapphire) was the systems to ensure they are not infected more than once. fastest computer worm in history. As it began spreading throughout the Internet, the worm infected more than 90 percent of vulnerable hosts within 10 minutes, causing significant disruption to 342 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 4) Morris Worms • It spread through a population almost an order of magnitude smaller than that of previous worms,  It attacked one operating system, but two demonstrating worms’ viability as an automated different computer architectures. mechanism to rapidly compromise machines on the  It had three distinct propagation vectors. Internet, even in niches without a software  It had several mechanisms for finding both monopoly. potential nodes to infect, particularly information about the local system’s IP B. Active Worms connectivity (its network class and gateway), and information found in user accounts. Active worms are similar to biological viruses in  It traversed trusted accounts using password terms of their infectous and self-propagating guessing. nature. They identify vulnerable computers, infect  The worm made heavy use of this them and the worm-infected computers propagate computationally intensive method by the infection further to other vulnerable computers. employing four information sources: accounts In order to understand worm behavior, we first with null passwords (no password), need to model it. Active worms use various scan information related to the user account, an mechanisms to propagate themselves efficiently. internal dictionary, and a word list on the local machines, /usr/dict/words. The basic form of active worms can be categorized  It installed its software via a two-step “hook as having the Pure Random Scan (PRS) nature. In and haul” method (explained later in the the PRS form, a worm-infected computer “Inside the worm” subsection) that required the continuously scans a set of random Internet IP use of a C compiler, link loader, and a callback addresses to find new vulnerable computers. Other network connection to the infecting system. worms propagate themselves more effectively than  It evaded notice by obscuring the process PRS worms using various methods, e.g., network parameters and rarely leaving files behind. port scanning, email, file sharing, Peer-to-Peer  It attempted to limit the reinfection rate on (P2P) networks, and Instant Messaging (IM). In each node (but not the total number). addition, worms usedifferent scan strategies during  It attempted to run forever on as many nodes different stages of propagation.In order to increase as possible. propagation efficiency, they use a local network or hitlist to infect previously identified vulnerable Although there had been worms before, no one computers at the initial stage of propagation. had tried to run one on a complex topology. For this worm to achieve its purpose of widespread They may also use DNS, network topology and propagation, it had to discover local topology in an routing information to identify active computers arbitrary graph[7]. instead of randomly scanning IP addresses.They split the target IP address space during propagation 5) Witty Worms in order to avoid duplicate scans. Li et al. studied a divide-conquer scanning technique that could While the Witty worm is only the latest in a string potentially spread faster and stealthier than a of self-propagating remote exploits, it distinguishes traditional random-scanning worm. Ha et al. itself through several interesting features: Formulated the problem of finding a fast and resilient propagation topology and propagation • It was the first widely propagated Internet worm schedule for Flash worms. Yang et al. studied the to carry a destructive payload. worm propagation over the sensor networks. • It started in an organized manner with an order of magnitude more ground-zero hosts than any III. PROPOSED TOOL FOR previous worm. MALWARE DETECTION • It represents the shortest known interval A. C-Worm between vulnerability disclosure and worm release—it began spreading the day after the ISS The C-Worm camouflages its propagation by vulnerability was publicized. controlling scan traffic volume during its propagation. The simplest way to manipulate scan • It spread through a host population in which every traffic volume is to randomly change the number of compromised host was proactive in securing its worm instances conducting port-scans. computer and networks. As other alternatives, a worm attacker may use an open-loop control (non-feedback) mechanism by 343 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 choosing a randomized and time related pattern for distribution of destination addresses. Other works the scanning and infection in order to avoid being study worms that attempt to take on new patterns to detected. Nevertheless, the open-loop control avoid detection[10] . approach raises some issues of the invisibility of the attack. Here are some of the techniques for identifying the worms in the host or in the networks. First, as we know, worm propagation over the Internet can be considered a dynamic system. 1) Distributing sensors When an attacker launches worm propagation, it is very challenging for the attacker to know the Determining the number and strategic placement of accurate parameters for worm propagation distributed sensors (for example, at an enclave’s dynamics over the Internet. gateway, at an upstream peering point, or both) for Consequently, the overall worm scan traffic a particular-size enclavemaximizes coverage and volume in the open-loop control system will expose minimizes communication cost and time to detect a much higher probability to show an increasing propagations and attack precursors. trend with the progress of worm propagation. As more and more computers get infected, they, in 2) Inferring intent turn, take part in scanning other computers. Hence, we consider the Cworm as a worst case attacking The relationships among common targeted victims scenario that uses a closedloop control for suggest what a scanning source’s intent might be. regulating the propagation speed based on the For example, a common source of stealthy feedback propagation statuseasy way to comply scanning from an attacking IP address directed with the conference paper formatting requirements is to use this document as a template and simply toward a set of unrelated victims appears type your text into it[10]. fundamentally different than an attacker scanning a set of IP addresses all owned by, say, several different banks. B. Existing Detection System 3) Profiling behavior. 1) Host Based Detection System A longitudinal study of attacker behavior and intent Worm detection has been intensively studied in the and their attacks against victims provide sufficient past and can be generally classified into two repeated behavior to accurately predict future categories: “host-based” detection and “network- attack steps. based” detection. 4) Classifying activities Host-based detection systems detect worms by monitoring, collecting, and analyzing worm We need a way to quickly classify worms and scan behaviors on end hosts.Since worms are malicious programs that execute on these computers, or probe activity into useful clusters and profiles analyzing the behavior of worm executables plays according to their characteristics (destination ports, an important role in host based detection systems. interprobe delay, and payload length, for example) and behaviour. 2) Network Based Detection System In contrast, network-based detection systems detect C. Proposed Detection Scheme worms primarily by monitoring, collecting, and analyzing the scan traffic (messages to identify There are three existing system to detect the worms vulnerable computers) generated by worm attacks. as well as malware attack. Network-based detection schemes commonly analyze the collected scanning traffic data by The first scheme is the volume mean-based applying certain decision rules for detecting the (MEAN) detection scheme which uses mean of worm propagation. For example,Venkataraman et scan traffic to detect worm propagation; the second al. and Wu et al. in proposed schemes to examine scheme is the trend-based (TREND) detection statistics of scan traffic volume, Zou et al. scheme which uses the increasing trend of scan presented a trend-based detection scheme to traffic to detect worm propagation; and the third examine the exponential increase pattern of scan scheme is the victim number variance based (VAR) traffic , Lakhina et al proposed schemes to examine detection scheme which uses the variance of the other features of scan traffic, such as the scan traffic to detect worm propagation. 344 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 The C-Worm adapts their propagation traffic Recall that the C-Worm goes undetected by patterns in order to reduce the probability of detection schemes that try to determine the worm detection, and to eventually infect more computers. propagation only in the time domain. Instead of The C-Worm is different from polymorphic worms time domain,frequency domain is used to detect the that deliberately change their payload signatures c worms as well as traditional worms. during propagation. The user give file to the scan block.It has to option,either it scan sequentially or it can 1) Architecture of Detection Tool: randomly.For each file,it calculate value using the Fourier Transform.At every time,the file is scan,that value is compared with Window sliding number.if value of that file that is to be scanned are greater than WSN then it detect as malware otherwise it shows non-detection of malware.If the malware is found then analysis the malware and prepare the chart for that analysis. Notice that the frequency domain analysis will require more samples in comparison with the time domain analysis,since the frequency domain analysis technique such as the Fourier transform, needs to derive power spectrum amplitude for different frequencies. Fig 1:Architecture of detection Tool When we scan system,first it will take the single The above diagram shows the architecture of file and then generates its number using fourier detection tool.The First block take the file to read transform.if that number is larger than the number then it passed to detection tool block which contain which are gererated from the window sliding the various block that shown in below diagram then number then it will shows that worms or malware it finally generate the report. is detected. The flow of above architecture are given below,which are also proposed in the paper. It will not only scan sequential but also randomly because of its nature of self propogation in different location in the system. IV. CONCLUSION In this paper, we studied a new class of smart- worm called CWorm,which has the capability to camouflage its propagation and further avoid the detection. It showed that, although the C-Worm successfully camouflages its propagation in the time domain, its camouflaging nature inevitably manifests as a distinct pattern in the frequency domain. Based on observation, we creates Host- based detection scheme to detect the C-Worm. 345 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 REFERENCES ON DEPENDABLE AND SECURE COMPUTING ,VOL. 8, NO. 3, MAY-JUNE 2011 [1] IVAN ARCE,ELIAS LEVY ,” An Analysis of [11] Zhenhai Duan, Peng Chen, Fernando Sanchez the Slapper Worm”. ,Yingfei Dong ,Mary Stephenson, James Barker” Detecting Spam Zombies by Monitoring Outgoing [2] DAVID MOORE, VERN PAXSON,” Inside Messages” the Slammer Worm” [12]Yanfang Ye, Tao Li, Qingshan Jiang, and [3] ELIAS LEVY,” The Making of a Spam Zombie Youyu Wang” CIMDS: Adapting Postprocessing Army” Techniques of Associative Classification for Malware Detection” [4] Yong Tang, Bin Xiao, Member, IEEE, and Xicheng Lu” Signature Tree Generation for [13] Carlos Raniery P. dos Santos, Rafael Santos Polymorphic Worms”, IEEE TRANSACTIONS Bezerra, Joao Marcelo Ceron,” Botnet Master ON COMPUTERS, VOL. 60, NO. 4, APRIL 2011 Detection Using a Mashup-based Approach” [5] Wei Yu, Member, IEEE, Nan Zhang, Member, [14] Zongqu Zhao” A Virus Detection Scheme IEEE, Xinwen Fu, Member, IEEE, and Wei Zhao, Based on Features of Control Flow Graph” Fellow, IEEESelf-Disciplinary Worms and Countermeasures: Modeling and Analysis”, IEEE [15] Mohamad Fadli Zolkipli Aman Jantan “An TRANSACTIONS ON PARALLEL AND Approach for Malware Behavior Identification and DISTRIBUTED SYSTEMS, VOL. 21, NO. 10, Classification” OCTOBER 2010 [16] M. Shankarapani, K. Kancherla, S. [6] Yong Tang and Shigang Chen,” An Automated Ramammoorthy, R. Movva, and S. Mukkamala Signature-Based Approach against Polymorphic “Kernel Machines for Malware Classification and Internet Worms” IEEE TRANSACTIONS ON Similarity Analysis” PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 7, JULY 2007 [17] Felix Leder, Bastian Steinbock, Peter Martini“Classification and Detection of [7] HILARIE ORMAN,” The Morris Worm: A Metamorphic Malware using Value Set Analysis” Fifteen-Year Perspective” [18] Desmond Lobo, Paul Watters and Xinwen Wu [8] Guanhua Yan and Stephan Eidenbenz,” “RBACS: Rootkit Behavioral Analysis and Modeling Propagation Dynamics of Bluetooth Classification System” Worms (Extended Version)”, IEEE TRANSACTIONS ON MOBILE COMPUTING, [19] Siddiqui M.A.:” Data Mining Methods for VOL. 8, NO. 3, MARCH 2009 Malware Detection.” [9] SALVATORE J. STOLFO,” Worm and Attack [20] Moskovitch R, Feher, Tzachar N, Berger E, Early Warning” Gitelman M, Dolev S,et al.” Unknown malcode detection using OPCODE representation. “ [10] Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, and Wei Zhao," Modeling and Detection of [21]Michael Erbschloe “A Computer Security Camouflaging Worm”, IEEE TRANSACTIONS Professional’s Guide to Malicious. 346 All Rights Reserved © 2012 IJARCET