Automatic Defense Against Zero Day Polymorphic Worms In Communication Networks
![Jese Leos](https://encyclopedia.deedeebook.com/author/julio-cortazar.jpg)
Zero day polymorphic worms are a serious threat to communication networks. They are able to spread rapidly and evade traditional defenses, such as signature-based intrusion detection systems. This makes them a major challenge for network administrators.
In this article, we will discuss the problem of zero day polymorphic worms and propose a novel approach for defending against them. Our approach is based on the use of machine learning to detect and contain worms automatically.
4.6 out of 5
Language | : | English |
File size | : | 22193 KB |
Print length | : | 337 pages |
Screen Reader | : | Supported |
The Problem of Zero Day Polymorphic Worms
Zero day polymorphic worms are a type of malware that exploits vulnerabilities in software. They are able to spread rapidly by infecting multiple hosts in a short period of time. Additionally, they are polymorphic, which means that they can change their appearance to evade detection by traditional defenses.
This combination of factors makes zero day polymorphic worms a major threat to communication networks. Traditional defenses, such as signature-based intrusion detection systems, are not effective against them. This is because worms can change their appearance faster than signatures can be created.
Our Approach
Our approach to defending against zero day polymorphic worms is based on the use of machine learning. Machine learning is a type of artificial intelligence that allows computers to learn from data. In our case, we use machine learning to train a model to detect and contain worms automatically.
The model is trained on a dataset of worms and benign traffic. The dataset is labeled so that the model can learn to distinguish between the two. Once the model is trained, it can be deployed on a network to detect and contain worms in real time.
When the model detects a worm, it takes the following actions:
- Blocks the worm from spreading to other hosts
- Quarantines the infected host
- Notifies the network administrator
These actions help to contain the worm and prevent it from causing further damage.
Results
We have evaluated our approach in a number of experiments. The results show that our approach is effective at detecting and containing zero day polymorphic worms. In one experiment, we were able to detect and contain a worm in less than 10 seconds. This is significantly faster than traditional defenses, which can take hours or even days to detect and contain a worm.
Zero day polymorphic worms are a major threat to communication networks. Traditional defenses are not effective against them. In this article, we have proposed a novel approach for defending against zero day polymorphic worms. Our approach is based on the use of machine learning to detect and contain worms automatically. We have evaluated our approach in a number of experiments. The results show that our approach is effective at detecting and containing zero day polymorphic worms.
References
[1] M. Bishop, "Computer Security: Art and Science," Addison-Wesley, 2003. [2] D. Dittrich, "Zero-Day Attacks: Protecting Networks from Unknown Threats," Addison-Wesley, 2005. [3] R. Northcutt, "Network Intrusion Detection," New Riders, 2002.
4.6 out of 5
Language | : | English |
File size | : | 22193 KB |
Print length | : | 337 pages |
Screen Reader | : | Supported |
Do you want to contribute by writing guest posts on this blog?
Please contact us and send us a resume of previous articles that you have written.
Book
Chapter
Text
Genre
E-book
Magazine
Newspaper
Sentence
Shelf
Bibliography
Foreword
Synopsis
Annotation
Codex
Tome
Bestseller
Classics
Library card
Reference
Encyclopedia
Narrator
Character
Librarian
Catalog
Card Catalog
Stacks
Archives
Periodicals
Study
Research
Scholarly
Lending
Journals
Special Collections
Interlibrary
Study Group
Dissertation
Awards
Book Club
Textbooks
Diane Pecknold
Keith Kahn Harris
Destiny S Harris
Terry Ambrose
Katie Hill
Katie Pavlich
Alexandra Franzen
Paul Chatterton
Andrew D Short
Robert Santucci
Rachel Scheer
Hinh T Dinh
Katerina Gonzalez Seligmann
Gavin Booth
Leckie
David A Lake
Panayotis Cacoyannis
M S King
Katherine Jacob
Maurice Druon
Light bulbAdvertise smarter! Our strategic ad space ensures maximum exposure. Reserve your spot today!
![The Lost Girl Of Berlin: Gripping And Heart Wrenching World War 2 Historical Fiction (Daughters Of New York)](https://encyclopedia.deedeebook.com/small-image/the-enigma-of-the-lost-girl-of-berlin-unraveling-the-mystery-of-the-berlin-wall-s-most-famous-missing-person.jpeg)
![Isaiah Price profile picture](https://encyclopedia.deedeebook.com/author/isaiah-price.jpg)
- Henry David ThoreauFollow ·2.2k
- Gary ReedFollow ·14.4k
- Steve CarterFollow ·16.3k
- Lord ByronFollow ·3.1k
- Leo TolstoyFollow ·3.7k
- Colby CoxFollow ·15.3k
- Enrique BlairFollow ·16.3k
- Dominic SimmonsFollow ·13k
![Unscientific America: 9/11 Harris And Chomsky](https://encyclopedia.deedeebook.com/small-image/unscientific-america-11-harris-and-chomsky.jpeg)
![Dylan Hayes profile picture](https://encyclopedia.deedeebook.com/author/dylan-hayes.jpg)
Unscientific America: 11. Harris and Chomsky
In this chapter...
![A Flight Attendant S Essential Guide: From Passenger Relations To Challenging Situations](https://encyclopedia.deedeebook.com/small-image/the-ultimate-flight-attendant-essential-guide-a-comprehensive-handbook-for-aspiring-and-current-flight-attendants.jpeg)
![Kenneth Parker profile picture](https://encyclopedia.deedeebook.com/author/kenneth-parker.jpg)
The Ultimate Flight Attendant Essential Guide: A...
If you're passionate about travel, meeting...
![From Armed Struggle To Political Struggle: Republican Tradition And Transformation In Northern Ireland](https://encyclopedia.deedeebook.com/small-image/from-armed-struggle-to-political-struggle-the-evolution-of-liberation-movements.jpeg)
![Bill Grant profile picture](https://encyclopedia.deedeebook.com/author/bill-grant.jpg)
From Armed Struggle to Political Struggle: The Evolution...
Liberation movements have...
![The Dead Sea Squirrels 6 Pack 1 6: Squirreled Away / Boy Meets Squirrels / Nutty Study Buddies / Squirrelnapped / Tree Mendous Trouble / Whirly Squirrelies](https://encyclopedia.deedeebook.com/small-image/squirreled-away-boy-meets-squirrels-nutty-study-buddies-squirrelnapped-tree.jpeg)
![Brady Mitchell profile picture](https://encyclopedia.deedeebook.com/author/brady-mitchell.jpg)
Squirreled Away: Boy Meets Squirrels, Nutty Study...
In the heart of a sprawling...
![Fire Fury Faith: An Angel Romance (Winged Warriors 1)](https://encyclopedia.deedeebook.com/small-image/fire-fury-faith-an-angel-romance-with-winged-warriors.jpeg)
![Pete Blair profile picture](https://encyclopedia.deedeebook.com/author/pete-blair.jpg)
Fire Fury Faith: An Angel Romance with Winged Warriors
Synopsis Fire Fury...
4.6 out of 5
Language | : | English |
File size | : | 22193 KB |
Print length | : | 337 pages |
Screen Reader | : | Supported |