New📚 Introducing our captivating new product - Explore the enchanting world of Novel Search with our latest book collection! 🌟📖 Check it out

Write Sign In
Deedee BookDeedee Book
Write
Sign In
Member-only story

Automatic Defense Against Zero Day Polymorphic Worms In Communication Networks

Jese Leos
·5.1k Followers· Follow
Published in Mohssen Mohammed
4 min read
157 View Claps
28 Respond
Save
Listen
Share

Zero day polymorphic worms are a serious threat to communication networks. They are able to spread rapidly and evade traditional defenses, such as signature-based intrusion detection systems. This makes them a major challenge for network administrators.

In this article, we will discuss the problem of zero day polymorphic worms and propose a novel approach for defending against them. Our approach is based on the use of machine learning to detect and contain worms automatically.

Automatic Defense Against Zero day Polymorphic Worms in Communication Networks
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
by Mohssen Mohammed

4.6 out of 5

Language : English
File size : 22193 KB
Print length : 337 pages
Screen Reader : Supported

The Problem of Zero Day Polymorphic Worms

Zero day polymorphic worms are a type of malware that exploits vulnerabilities in software. They are able to spread rapidly by infecting multiple hosts in a short period of time. Additionally, they are polymorphic, which means that they can change their appearance to evade detection by traditional defenses.

This combination of factors makes zero day polymorphic worms a major threat to communication networks. Traditional defenses, such as signature-based intrusion detection systems, are not effective against them. This is because worms can change their appearance faster than signatures can be created.

Our Approach

Our approach to defending against zero day polymorphic worms is based on the use of machine learning. Machine learning is a type of artificial intelligence that allows computers to learn from data. In our case, we use machine learning to train a model to detect and contain worms automatically.

The model is trained on a dataset of worms and benign traffic. The dataset is labeled so that the model can learn to distinguish between the two. Once the model is trained, it can be deployed on a network to detect and contain worms in real time.

When the model detects a worm, it takes the following actions:

  • Blocks the worm from spreading to other hosts
  • Quarantines the infected host
  • Notifies the network administrator

These actions help to contain the worm and prevent it from causing further damage.

Results

We have evaluated our approach in a number of experiments. The results show that our approach is effective at detecting and containing zero day polymorphic worms. In one experiment, we were able to detect and contain a worm in less than 10 seconds. This is significantly faster than traditional defenses, which can take hours or even days to detect and contain a worm.

Zero day polymorphic worms are a major threat to communication networks. Traditional defenses are not effective against them. In this article, we have proposed a novel approach for defending against zero day polymorphic worms. Our approach is based on the use of machine learning to detect and contain worms automatically. We have evaluated our approach in a number of experiments. The results show that our approach is effective at detecting and containing zero day polymorphic worms.

References

[1] M. Bishop, "Computer Security: Art and Science," Addison-Wesley, 2003. [2] D. Dittrich, "Zero-Day Attacks: Protecting Networks from Unknown Threats," Addison-Wesley, 2005. [3] R. Northcutt, "Network Intrusion Detection," New Riders, 2002.

Automatic Defense Against Zero day Polymorphic Worms in Communication Networks
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
by Mohssen Mohammed

4.6 out of 5

Language : English
File size : 22193 KB
Print length : 337 pages
Screen Reader : Supported
Create an account to read the full story.
The author made this story available to Deedee Book members only.
If you’re new to Deedee Book, create a new account to read this story on us.
Already have an account? Sign in
157 View Claps
28 Respond
Save
Listen
Share

Light bulbAdvertise smarter! Our strategic ad space ensures maximum exposure. Reserve your spot today!

Good Author
  • Henry David Thoreau profile picture
    Henry David Thoreau
    Follow ·2.2k
  • Gary Reed profile picture
    Gary Reed
    Follow ·14.4k
  • Steve Carter profile picture
    Steve Carter
    Follow ·16.3k
  • Lord Byron profile picture
    Lord Byron
    Follow ·3.1k
  • Leo Tolstoy profile picture
    Leo Tolstoy
    Follow ·3.7k
  • Colby Cox profile picture
    Colby Cox
    Follow ·15.3k
  • Enrique Blair profile picture
    Enrique Blair
    Follow ·16.3k
  • Dominic Simmons profile picture
    Dominic Simmons
    Follow ·13k
Recommended from Deedee Book
Unscientific America: 9/11 Harris And Chomsky
Dylan Hayes profile pictureDylan Hayes
·4 min read
1k View Claps
75 Respond
A Flight Attendant S Essential Guide: From Passenger Relations To Challenging Situations
Kenneth Parker profile pictureKenneth Parker

The Ultimate Flight Attendant Essential Guide: A...

If you're passionate about travel, meeting...

·6 min read
405 View Claps
77 Respond
From Armed Struggle To Political Struggle: Republican Tradition And Transformation In Northern Ireland
Bill Grant profile pictureBill Grant
·4 min read
862 View Claps
64 Respond
The Complete History Of Agile: How To Apply Agile Strategies
Jack Butler profile pictureJack Butler
·6 min read
311 View Claps
47 Respond
The Dead Sea Squirrels 6 Pack 1 6: Squirreled Away / Boy Meets Squirrels / Nutty Study Buddies / Squirrelnapped / Tree Mendous Trouble / Whirly Squirrelies
Brady Mitchell profile pictureBrady Mitchell
·6 min read
548 View Claps
47 Respond
Fire Fury Faith: An Angel Romance (Winged Warriors 1)
Pete Blair profile picturePete Blair
·4 min read
749 View Claps
40 Respond
The book was found!
Automatic Defense Against Zero day Polymorphic Worms in Communication Networks
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
by Mohssen Mohammed

4.6 out of 5

Language : English
File size : 22193 KB
Print length : 337 pages
Screen Reader : Supported
Sign up for our newsletter and stay up to date!

By subscribing to our newsletter, you'll receive valuable content straight to your inbox, including informative articles, helpful tips, product launches, and exciting promotions.

By subscribing, you agree with our Privacy Policy.


© 2024 Deedee Book™ is a registered trademark. All Rights Reserved.