Intrusion Detection for Viruses and Worms

نویسنده

  • Thomas M. Chen
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Tolerance and Worm Spread

We show how the Dependable Intrusion Tolerance (DIT) server architecture prevents the effects and propagation of some common Internet viruses and worms. This results from complementary detection and prevention mechanisms that provide defensive depth, and the application of the principle of least privilege at the network level, including the use of signature-based IDS to enforce higher-level spe...

متن کامل

Intrusion Detection: Challenges and Current Solutions

The problem of intrusion has been a long standing computer security challenge. With governments and institutes relying more on computer networks it is becoming essential to arm networks with defenses against intrusion and misuse. Such intrusions include installing harmful viruses, spreading worms, initiating distributed attacks, and misuse by authorized users. To defend against these attacks, s...

متن کامل

Wide-area Hardware-accelerated Intrusion Prevention Systems (WHIPS)

The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key problem for network administrators. Effective techniques are now needed to protect networks against outbreaks of malware. Wire-speed firewalls have been widely deployed to limit the flow of traffic from untrusted domains....

متن کامل

Distributed Instrusion Prevention in Active and Extensible Networks

The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key problem for network administrators. Effective techniques are now needed to protect networks against outbreaks of malware. Wire-speed firewalls have been widely deployed to limit the flow of traffic from untrusted domains....

متن کامل

ILR: a Self-Tuning Distributed Attacks Detection System

In order to protect Internet users from various attacks such as worms, viruses and other intrusions, signature-based intrusion detection system (IDS) should be deployed at the critical part of the network with rapid response for updating newly emerged attack signatures and containing the spread of worms or viruses at their early stage. The processing speed of one IDS cannot achieve the throughp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004