Computer worm detection has been a challenging and often elusive task. This is partly because of the difficulty of accurately modeling either the normal behavior of computer networks or the malicious actions of computer worms. This paper presents a literature review on the worm detection techniques, highlighting the worm characteristics leveraged for detection and the limitations of the various detection techniques. The paper broadly categorizes the worm detection approaches into content signature based detection, polymorphic worm detection, anomaly based detection, and behavioral signature based detection. The gap in the literature in the techniques is indicated and is the main contribution of the paper
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
The Internet has become a core component of our lives and businesses. Its reliability and availab...
Abstract: This paper surveys the Internet worms-related literature and how stealthy worm behaviour c...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
This paper presents a new approach to the automatic detection of worms using behavioral signatures. ...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
AbstractIncreasing threats from worms in the internet continue to be a challenge for current content...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Abstract- on July 19th 2001 “Code-Red ” was released into the internet after fourteen hours the worm...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Most current anti-worm systems and intrusion-detection systems use signature-based technology instea...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
The Internet has become a core component of our lives and businesses. Its reliability and availab...
Abstract: This paper surveys the Internet worms-related literature and how stealthy worm behaviour c...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Computer worms are a type of malicious malware that prey on networked machines. A number of differe...
This paper presents a new approach to the automatic detection of worms using behavioral signatures. ...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
AbstractIncreasing threats from worms in the internet continue to be a challenge for current content...
The conference aimed at supporting and stimulating active productive research set to strengthen the ...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Abstract- on July 19th 2001 “Code-Red ” was released into the internet after fourteen hours the worm...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
Most current anti-worm systems and intrusion-detection systems use signature-based technology instea...
<p>Network intrusion detection systems typically detect worms by examining packet or flow logs...
The scope of this research is computer worm detection. Computer worm has been defined as a process t...
The Internet has become a core component of our lives and businesses. Its reliability and availab...