Title of article :
Review Study on Different Attack Strategies of Worm in a Network
Author/Authors :
mondal, avijit techno international batanagar - department of cse, India , das, arnab kumar jis university, India , nath, sayan techno international batanagar, India , goswami, radha tamal techno international new town, Kolkata, India
From page :
363
To page :
375
Abstract :
In today’s era Internet worm is a giant threat to the network infrastructure. Although there are different strategies to sense those hazard at early stages. They detect using some signature based approach. But when novel attacks come into the structure, it is very hard to detect them as they do not have any previous signature. For those some signature based methodology is used. In our work we have reviewed different strategies of internet worm detection and prevention and this article also explores the existing techniques to automate signatures for network worms.
Keywords :
Network , Worm , Signature , Replicate , Worm Propagation Methodology , Automating Method for Worm
Journal title :
Webology
Journal title :
Webology
Record number :
2750700
Link To Document :
بازگشت