modeling and detection of camouflaging worm uml representation
#1

Hi!
This is Batool, doing my B.tech final year from Dr. V.R.K Womens college in engineeing and tech. I am doing my project based on java. My project topic is "Modeling and Detection of Camouflaging Worm". I want power point presentation, documentation and all those things that is needed to give a good seminar for the given topic name as soon as possible.
I have an abstract of my topic and nothing else and i have attached that document... Please help me as soon as possible. Would be great-full to your kind help.

-- BATOOL
Reply
#2
Modeling and Detection of Camouflaging Worm


.ppt   Camouflaging Worm.ppt (Size: 136.5 KB / Downloads: 12)

Abstract

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them.
In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms.
We analyze characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain.
However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic.

Existing System

Existing worm detection schemes will not be able to detect such scan traffic patterns, it is very important to understand such smart-worms and develop new countermeasures to defend against them.
Existing detection schemes are based on a tacit assumption that each worm-infected computer keeps scanning the Internet and propagates itself at the highest possible speed. Furthermore, it has been shown that the worm scan traffic volume and the number of worm-infected computers exhibit exponentially increasing patterns.
Nevertheless, the attackers are crafting attack strategies that intend to defeat existing worm detection systems. In particular, ‘stealth’ is one attack strategy used by a recently-discovered active worm called “Attack” worm and the “self-stopping” worm circumvent detection by hibernating (i.e., stop propagating) with a pre-determined period. Worm might also use the evasive scan and traffic morphing technique to hide the detection.

Proposed System

Proposed Worm detection schemes that are based on the global scan traffic monitor by detecting traffic anomalous behavior, there are other worm detection and defense schemes such as sequential hypothesis testing for detecting worm-infected computers, payload-based worm signature detection.

In presented both theoretical modeling and experimental results on a collaborative worm signature generation system that employs distributed fingerprint filtering and aggregation and multiple edge networks.

In presented a state-space feedback control model that detects and control the spread of these viruses or worms by measuring the velocity of the number of new connections an infected computer makes. Despite the different approaches described above, we believe that detecting widely scanning anomaly behavior continues to be a useful weapon against worms, and that in practice multifaceted defense has advantages.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: what are the application used in camoflaging worm, source code for modeling and detection of camouflaging worm latest, data flow diagram for modelling and detection camouflaging worm, camouflaging worm ppt slides, slammer worm removal, uml tetris, modeling and detection of camouflaging worm free project with coding,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  anomaly detection code in matlab 3 2,074 23-04-2018, 12:04 AM
Last Post: Guest
  ppt on design and implementation of intelligent campus security tracking system based on rfid and zigbee 7 15,923 09-02-2018, 02:20 PM
Last Post: udaya
  matlab code shadow detection and removal in colour images using matlab 2 2,240 12-01-2018, 01:24 PM
Last Post: dhanabhagya
  ppt for bomb detection using robot 3 2,630 02-01-2018, 03:40 PM
Last Post: dhanabhagya
Smile physics investigatory projects for class 12 cbse to set up a common base transistor circuit and to study its input and o 3 25,018 20-12-2017, 09:44 AM
Last Post: jaseela123d
  matlab code for speed breaker detection 1 1,285 27-10-2017, 10:22 AM
Last Post: Guest
  skin cancer detection using neural networks matlab code 13 3,839 23-10-2017, 02:52 PM
Last Post: Guest
  optic disc detection and segmentation ppt 3 1,929 13-09-2017, 11:41 AM
Last Post: jaseela123d
  matlab code for blood cancer detection 2 1,332 15-07-2017, 03:00 PM
Last Post: jaseela123d
  eaack a secure intrusion detection system for manets ppt 2 1,216 08-06-2017, 10:26 AM
Last Post: jaseela123d

Forum Jump: