What is it about?
Computer worm detection has been a challenging and often elusive task. This is partly because of the difficulty of accurately modeling either the normal behavior of computer networks or the malicious actions of computer worms. This paper presents a literature review on the worm detection techniques, highlighting the worm characteristics leveraged for detection and the limitations of the various detection techniques. The paper broadly categorizes the worm detection approaches into content signature based detection, polymorphic worm detection, anomaly based detection, and behavioral signature based detection. The gap in the literature in the techniques is indicated and is the main contribution of the paper.
Featured Image
Photo by Markus Spiske on Unsplash
Why is it important?
Analysis of existing detection models for computer worms
Perspectives
Read the Original
This page is a summary of: A Tour of the Computer Worm Detection Space, International Journal of Computer Applications, October 2014, Foundation of Computer Science,
DOI: 10.5120/18169-9045.
You can read the full text:
Contributors
The following have contributed to this page