Dissertation > Excellent graduate degree dissertation topics show

Structure Analysis and Related Techniques Study on Network Worms

Author: LiHaiTao
Tutor: LuoShouShan
School: Beijing University of Posts and Telecommunications
Course: Software Engineering
Keywords: Internet security Internet worm uniform function model transmitting model hiding technology
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 208
Quote: 1
Read: Download Dissertation


Internet worms are programs which run independently and can copy themselves to other hosts automatically. Its huge destructive ability brings society great economic loss every time it breaks out. Especially future worms will have higher propagation speed, more definite purpose and more advanced techniques. With the development of computer technology and enhancement of network function, quick transmitting of Internet worm become possible. So, worms can spread out over the Internet in several minutes and the Internet will be broken . In this thesis, we make a comprehensive research on Internet worms and try to contribute an all-sided research .In the thesis, we introduced the working process of Internet worms .Moreover, the behavior characteristics, entity construction , and uniform function model are given. This thesis mainly studies some key techniques of Internet worms, including transmitting strategies , attacking techniques, survival techniques, and selective attack techniques.The main contents of this thesis are as follows:First, this thesis analyzed the difference between Internet worm and virus.Second, the thesis introduced the behavior characteristics of Internet worms, and entity construction is given. Moreover , uniform function model (transmitting module , hiding module , target function module)are given.Third, this thesis mainly studies some key techniques of Internet worms, including transmitting strategies, attacking techniques, survival techniques and selective attack techniques.Fourth, in this thesis, wormnet is analysed and a new worm is designed and implemented.

Related Dissertations

  1. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  2. The Study of Image Watermark Base on Discrete Wavelet Transformation,TP309.7
  3. Application Research of Intrusion Prevention System in the Field of Education Network,TP393.08
  4. Design and Implementation of Credit Management System for Rural Credit Cooperatives,TP311.52
  5. The Plan, Design and Construction of Digital Campus,TP393.18
  6. Multi- vector worm propagation simulation design and implementation,TP393.08
  7. Telecom operators IP Internet Security Services Research,TP393.08
  8. The Design of a Detection and Warning System for Internet Worm Based on the Characteristics of the Network,TP393.08
  9. Research and Implementation of the Key Technology for Distributed Host Monitoring System,TP393.08
  10. The Research and Implementation of Captcha Recognition System,TP391.41
  11. Network Security Design and Implementation of TCT Corporation,TP393.08
  12. P2P Botnet Detection in Small and Medium LAN,TP393.1
  13. The Design and Realization of Embedded Application System Security System,TP393.08
  14. On Our Internet Securities Trading and Perfection of It’s Legal System,D922.287
  15. Design and Research of Security Event Analysis Platform Based on Data Mining Technoledge,TP311.52
  16. Defense research and implementation of a distributed denial of service attacks,TP393.08
  17. S Telecom Internet security risk assessment study,F626;F224
  18. Solution of Large Sparse Matrix in Network Research and Influence of Traffic Model on Worm Tracing,TP393.08
  19. Robust Digital Image Watermarking for Copyright Protection Based on Human Visual System,TP309
  20. Research on the Security of Brand Automobile Network Trading Based on Fair Exchange Protocol,TP393.08
  21. The Study of Security Based on IPSec VPN,TP393.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile