Header menu link for other important links
X
NADTW: new approach for detecting TCP worm
M. Anbar, R. Abdullah, A. Munther, , R.M.A. Saad
Published in Springer London
2017
Volume: 28
   
Pages: 525 - 538
Abstract
A computer worm is a self-replicating malicious code that does not alter files but resides in active memory where it duplicates itself. Worms use parts of the operating system that are automatic and usually invisible to the user. Worms commonly exhibit abnormal behaviors, which become noticeable only when their uncontrolled replication consumes system resources and consequently decelerates or halts other tasks completely. This paper proposes an effective approach for detecting the presence of TCP network worms. This approach consists of two phases: Statistical Cross-relation for Network Scanning (SCANS) phase and the Worm Correlation phase. The SCANS phase is used to detect the presence of the network scanning behavior of a network worm, while the worm correlation phase is used to detect the Destination Source Correlation (DSC) behavior of the network worm. The proposed approach has been tested with a simulated dataset obtained from the GTNetS simulator. The numerical results showed that the proposed approach is efficient and outperforms the well-known DSC approach in terms of detecting the presence of TCP network worm. © 2016, The Natural Computing Applications Forum.
About the journal
JournalData powered by TypesetNeural Computing and Applications
PublisherData powered by TypesetSpringer London
ISSN09410643