superworms and cryptovirology ppt
#1

[/font][/b]superworms and cryptovirology full seminar material
Reply
#2
Understanding the potential extent of future attacks is the key to successfully protecting against them. Designers of protection mechanisms must take into account the potential ferocity and sophistication of viruses that are just around the corner. That's why we think that the potentially destructive capabilities of fast-running worms such as the Warhol worm, Flash worm and Curious Yellow need to be scanned to the fullest extent possible. When re-visiting some past virus techniques, we can find some using cryptographic tools in their malicious activity. This alarming property, combined with the speed of so-called "superworms", is explored in the present work.


The most striking and alarming trends in today's computer attacks are the high automation and speed, the increasing sophistication of attack tools, the vulnerability discovery rate that is difficult to maintain, the increased permeability of firewalls and nature Highly asymmetric threat. Surveillance organizations name worms as one of the four most alarming types of attacks today.

The most notable incidents that caused such concern are the outbreaks of Code Red, Code Red II, Nimda and, more recently, linux.slapper worms. The four worms stood out for their extraordinary speeds of propagation; However, in terms of damage, they were classified as a low threat. This discrepancy between levels of propagation techniques and destructive capacities was immediately detected and several interesting works were produced which (sometimes too emotionally) put the situation into perspective and explored the limits of the destructive potential of rapidly propagating malicious entities and cooperation.

However, this potential becomes even more overwhelming when it comes to combining the speed of worms with the ferocity of some past viruses. Cryptography, as some point out, is often considered a science that provides us with tools to enforce integrity and confidentiality; However, its undoubted strengths can be used to attack these same properties. Some of the viruses studied were based on cryptographic tools to cause damage that is quite difficult to undo.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cryptovirology abstract, applications of cryptovirology, benefits of cryptovirology, cryptovirology dissertation, cryptovirology help, cryptovirology pdf** mill, slides for the presentation of cryptovirology,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  seminar report on 3d solar cells ppt paper presentation ppt seminars report on 3d solar cells ppt paper presentation ppt 5 42,533 15-04-2018, 08:39 AM
Last Post: Guest
  ppt on design and implementation of intelligent campus security tracking system based on rfid and zigbee 7 15,898 09-02-2018, 02:20 PM
Last Post: udaya
Smile physics investigatory projects for class 12 cbse to set up a common base transistor circuit and to study its input and o 3 24,999 20-12-2017, 09:44 AM
Last Post: jaseela123d
  design of flexible and rigid pavements using lime cement and flyash as stabilizing material 1 5,165 05-04-2017, 01:07 PM
Last Post: jaseela123d
Question scope and importance of study of recruitment and selection 1 5,457 30-03-2017, 05:01 PM
Last Post: jaseela123d
  superworms and cryptovirology tech seminars ppt 1 615 28-03-2017, 11:16 AM
Last Post: jaseela123d
  ppt ultrasonic spectacles and waist belt for visually impaired and blind persons 1 1,091 02-03-2017, 04:53 PM
Last Post: jaseela123d
  abstract and slides to download on topic cad and cae in biomedical field 1 1,039 28-02-2017, 09:49 AM
Last Post: jaseela123d
  wireless dc motor speed and direction control using rf communication and its disadvantages 5 2,109 26-09-2016, 12:49 PM
Last Post: pawarravi2312@gmai. com
Question How to open old sakal newspaper and download and print ? 16 14,754 14-08-2016, 08:16 AM
Last Post: meghanath

Forum Jump: