Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (1): 44-48    DOI: 10.11925/infotech.1003-3513.2007.01.11
Current Issue | Archive | Adv Search |
Design and Application of Network Worm Detection System
Qian Xu   Gu Wei   Chen Linghui   Ding Xiaofeng
(Beijing Document Service,  Beijing 100036, China)
Download: PDF(706 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

The application system for network worm detecting is designed, as well the prototype is constructed. The distributed structure is adopted to monitor the unknown worms at real-time, analyse the network stream, bring up the signature of worm spreading to identify that the unknown worms erupt in local network. The worm detection system could be applied as a significant aspect of network security architecture to secure the local network system.

Key wordsNetwork worm      Distributed structure      Anomaly detection     
Received: 13 October 2006      Published: 25 January 2007
: 

TP309.5

 
Corresponding Authors: Qian Xu     E-mail: qx@cetin.net.cn
About author:: Qian Xu,Gu Wei,Chen Linghui,Ding Xiaofeng

Cite this article:

Qian Xu,Gu Wei,Chen Linghui,Ding Xiaofeng . Design and Application of Network Worm Detection System. New Technology of Library and Information Service, 2007, 2(1): 44-48.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.01.11     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I1/44

1Steve W.Open problems in computer virus research. http://www.research.ibm.com/antivirus/SciPapers/White/Problems/ Problems.html(Accessed Sept.10,2005)
2Jose Nazario, Jeremy Anderson, Rick Wash, Chris Connelly. The Future of Internet Worms. Presented at the Blackhat Briefings, July, 2001, Las Vegas
3Cliff Changchun Zou, Weibo Gong, Don Towsley. Code Red Worm Propagation Modeling and Analysis. 9th ACM Conference on Computer and Communication Security, Nov. 18-22,2002
4Staniford S,Paxson V,Weaver N. How to Own the Internet in Your Spare Time. 11th Usenix Security Symposium, San Francisco, August 2002
5Lockwood J W, Moscola J, Kulig M. Internet worm and virus protection in dynamically reconfigurable hardware, WORM 2003

[1] Zhai Dongsheng,Guo Cheng,Zhang Jie,Li Dengjie. Identifying Technology Opportunities with Anomaly Detection Technique[J]. 现代图书情报技术, 2016, 32(10): 81-90.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn