Font Size: a A A

The use of heuristics in identifying self-propagating malicious mobile code

Posted on:2006-05-22Degree:M.S.C.SType:Thesis
University:West Virginia UniversityCandidate:Twardus, JesseFull Text:PDF
GTID:2458390008975878Subject:Computer Science
Abstract/Summary:
Self-propagating malicious mobile code, or worms, has become a major threat to modern computer systems. As these types of viruses thrive in a networked computing environment, they have exploded in popularity in recent years.; Modern defenses have proved inadequate in protecting computer systems from the worm threat. The most often used remedy is a signature-based detection system that scans each incoming network packet for the presence of a signature identifying a specific worm. As a new worm or variant of an existing worm is released, this signature set must be updated to include definitions for the new worm or variant.; In this thesis we propose a heuristic-based system for worm detection. This system should be able to detect many different worms and worm variants using only a small heuristic set. The use of heuristics also should eliminate the need to update the rule set as new worms or worm variants are released.
Keywords/Search Tags:Worm
Related items