Font Size: a A A

Mechanism And Defense Of The Network Worm

Posted on:2006-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:2168360152987487Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Following the appearance of the attack toolkits of worms and the resources on how to code a worm, it is easier and easier to code a new worm. This leads to the more and more worms' appearance. The loss caused by the worms is heavier and heavier. The loss has been more than the one brought by the viruses. With the quick development of the Internet, the techniques used by the worms are advancing, and the leaks becomes more and more. If we won't develop the more effective methods to detect and defend the worms, they will threaten the further development of the Internet.The paper mainly includes the following knowledge:I. Differentiate the conceptions of the worm and virus.II. Address the worm's propagation models and strategies, the worm's function structures.III. Deeply introduce the various theories of the worms.IV. Explain the current methods to detect the worms.V. From the aspects of the people and the security productions, introduce the measures to defend the worms. In this part, we mainly emphasize the new method to protect the buffer from overflowing, and illustrate the effect of the new method with the experiences.At the end, this paper points out the direction to further the research.
Keywords/Search Tags:Internet, Worm, Virus, propagation model, propagation strategy, the buffer overflow attack, attack toolkit
PDF Full Text Request
Related items