Detecting worm propagation using traffic concentration analysis and inductive learning

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL Slammer worm. Since various worms quickly spread over the Internet using self-propagation mechanism, it is crucial to detect worm propagation and protect them for secure network infrastructure. In this paper, we propose a mechanism to detect worm propagation using the computation of entropy of network traffic and the compilation of network traffic. In experiments, we tested our framework in simulated network settings and could successfully detect worm propagation. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Noh, S., Lee, C., Ryu, K., Choi, K., & Jung, G. (2004). Detecting worm propagation using traffic concentration analysis and inductive learning. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3177, 402–408. https://doi.org/10.1007/978-3-540-28651-6_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free