What is it about?

Computer worm detection has been a challenging and often elusive task. This is partly because of the difficulty of accurately modeling either the normal behavior of computer networks or the malicious actions of computer worms. This paper presents a literature review on the worm detection techniques, highlighting the worm characteristics leveraged for detection and the limitations of the various detection techniques. The paper broadly categorizes the worm detection approaches into content signature based detection, polymorphic worm detection, anomaly based detection, and behavioral signature based detection. The gap in the literature in the techniques is indicated and is the main contribution of the paper.

Featured Image

Why is it important?

Analysis of existing detection models for computer worms

Perspectives

Any research on computer worm detection models may benefit from this analysis.

Nelson Ochieng Odunga
Strathmore University

Read the Original

This page is a summary of: A Tour of the Computer Worm Detection Space, International Journal of Computer Applications, October 2014, Foundation of Computer Science,
DOI: 10.5120/18169-9045.
You can read the full text:

Read

Contributors

The following have contributed to this page