Automatic Defense Against Zero Day Polymorphic Worms In Communication Networks
Zero day polymorphic worms are a serious threat to communication networks. They are able to spread rapidly and evade traditional defenses, such as signature-based intrusion detection systems. This makes them a major challenge for network administrators.
In this article, we will discuss the problem of zero day polymorphic worms and propose a novel approach for defending against them. Our approach is based on the use of machine learning to detect and contain worms automatically.
4.6 out of 5
Language | : | English |
File size | : | 22193 KB |
Print length | : | 337 pages |
Screen Reader | : | Supported |
The Problem of Zero Day Polymorphic Worms
Zero day polymorphic worms are a type of malware that exploits vulnerabilities in software. They are able to spread rapidly by infecting multiple hosts in a short period of time. Additionally, they are polymorphic, which means that they can change their appearance to evade detection by traditional defenses.
This combination of factors makes zero day polymorphic worms a major threat to communication networks. Traditional defenses, such as signature-based intrusion detection systems, are not effective against them. This is because worms can change their appearance faster than signatures can be created.
Our Approach
Our approach to defending against zero day polymorphic worms is based on the use of machine learning. Machine learning is a type of artificial intelligence that allows computers to learn from data. In our case, we use machine learning to train a model to detect and contain worms automatically.
The model is trained on a dataset of worms and benign traffic. The dataset is labeled so that the model can learn to distinguish between the two. Once the model is trained, it can be deployed on a network to detect and contain worms in real time.
When the model detects a worm, it takes the following actions:
- Blocks the worm from spreading to other hosts
- Quarantines the infected host
- Notifies the network administrator
These actions help to contain the worm and prevent it from causing further damage.
Results
We have evaluated our approach in a number of experiments. The results show that our approach is effective at detecting and containing zero day polymorphic worms. In one experiment, we were able to detect and contain a worm in less than 10 seconds. This is significantly faster than traditional defenses, which can take hours or even days to detect and contain a worm.
Zero day polymorphic worms are a major threat to communication networks. Traditional defenses are not effective against them. In this article, we have proposed a novel approach for defending against zero day polymorphic worms. Our approach is based on the use of machine learning to detect and contain worms automatically. We have evaluated our approach in a number of experiments. The results show that our approach is effective at detecting and containing zero day polymorphic worms.
References
[1] M. Bishop, "Computer Security: Art and Science," Addison-Wesley, 2003. [2] D. Dittrich, "Zero-Day Attacks: Protecting Networks from Unknown Threats," Addison-Wesley, 2005. [3] R. Northcutt, "Network Intrusion Detection," New Riders, 2002.
4.6 out of 5
Language | : | English |
File size | : | 22193 KB |
Print length | : | 337 pages |
Screen Reader | : | Supported |
Do you want to contribute by writing guest posts on this blog?
Please contact us and send us a resume of previous articles that you have written.
- Book
- Chapter
- Text
- Genre
- E-book
- Magazine
- Newspaper
- Sentence
- Shelf
- Bibliography
- Foreword
- Synopsis
- Annotation
- Codex
- Tome
- Bestseller
- Classics
- Library card
- Reference
- Encyclopedia
- Narrator
- Character
- Librarian
- Catalog
- Card Catalog
- Stacks
- Archives
- Periodicals
- Study
- Research
- Scholarly
- Lending
- Journals
- Special Collections
- Interlibrary
- Study Group
- Dissertation
- Awards
- Book Club
- Textbooks
- Diane Pecknold
- Keith Kahn Harris
- Destiny S Harris
- Terry Ambrose
- Katie Hill
- Katie Pavlich
- Alexandra Franzen
- Paul Chatterton
- Andrew D Short
- Robert Santucci
- Rachel Scheer
- Hinh T Dinh
- Katerina Gonzalez Seligmann
- Gavin Booth
- Leckie
- David A Lake
- Panayotis Cacoyannis
- M S King
- Katherine Jacob
- Maurice Druon
Light bulbAdvertise smarter! Our strategic ad space ensures maximum exposure. Reserve your spot today!
- Henry David ThoreauFollow ·2.2k
- Gary ReedFollow ·14.4k
- Steve CarterFollow ·16.3k
- Lord ByronFollow ·3.1k
- Leo TolstoyFollow ·3.7k
- Colby CoxFollow ·15.3k
- Enrique BlairFollow ·16.3k
- Dominic SimmonsFollow ·13k
Unscientific America: 11. Harris and Chomsky
In this chapter...
The Ultimate Flight Attendant Essential Guide: A...
If you're passionate about travel, meeting...
From Armed Struggle to Political Struggle: The Evolution...
Liberation movements have...
Squirreled Away: Boy Meets Squirrels, Nutty Study...
In the heart of a sprawling...
Fire Fury Faith: An Angel Romance with Winged Warriors
Synopsis Fire Fury...
4.6 out of 5
Language | : | English |
File size | : | 22193 KB |
Print length | : | 337 pages |
Screen Reader | : | Supported |