Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of Anti Worm Framework

Author: ZhangZuYuan
Tutor: ZhangZongSheng
School: Jilin University
Course: Software Engineering
Keywords: benign worm anti-worm framework worm counteract worm propagationstrategy
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 25
Quote: 0
Read: Download Dissertation


Worm is always served as one of the most serious threaten of the Network, andresearch on how to detect and clear them from computers and networks is a hot areain the field of network security. Researchers all over the world have proposed lots ofapproaches to detect and clear the worms, and all of these methods have achievedgood results. The proposed benign-worm-anti-worm methods have taken a new pathfor detecting and clearing the worms. Better Results have been achieved by using it tocompete with the worms in the network.This paper designs and implements an industrial universal anti-worm frameworkwith producing benign-worm based on the idea of benign-worm. In order to acceleratethe propagation of the benign worms inside the network, a multi-threaddivide-and-conquer strategy is adopted. In order to improve the transmission speed,the generated benign worms without anti-worm programs are downloaded from theserver in a C/S structure. The frameset is implemented with Python language and runson Linux platform. This frameset can support for detecting and clearing both knownworms and unknown worms. Lastly, we make some tests for the proposed framesetand the benign-worm generated by the frameset. Experimental results show that theproposed frameset is correct, and its generated benign-worm can spread fast in thenetwork and detect and clear worms efficiently.There are mainly three aspects of the proposed frameset for detecting andclearing worms:(1) For known worms, we store the killing program in the killing database, sothat uses only need to choose to kill any kind of worms.(2) For unknown worms, we firstly determine the way the worm stores and runsin the system. Then, users can choose the corresponding killing sub-item inthe frameset. After determining the type of loophole utilized by the worm, the corresponding vulnerability scanning program and vulnerability exploitationprogram are chosen in the vulnerability database.(3) As a frameset, it is extensible. So that users can add the database of itsvulnerability scanning, vulnerability exploitation, vulnerability fixes, wormskilling and killing sub-item.The proposed framework could efficiently detect and clear worms withoutclient-side. It possesses some application value, however, the usage is still complex,and should be improved to be user-friendly.

Related Dissertations

  1. Research of P2P Worm Behavior Model and Its Quarantining Metheds,TP393.08
  2. Research on Mechanism and Defense of Malicious Code,TP393.08
  3. Divide-and-Rule-Hybrid-Benign Worms Confrontation Strategy Based on Time-delay,TP393.08
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Research of IRC Botnet Detection Based on Behavior,TP393.08
  6. Research on the Impact Analysis of Network Security Incidents Based on Simulation,TP393.08
  7. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  8. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  9. Analysis and research -based HTTP proxy security gateway,TP393.08
  10. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  11. Encryption Card Application of Embedded Hardware Firewall Based on IPsec VPN,TP393.08
  12. Research on Intrusion Detection Based on Feature Selection,TP393.08
  13. Research and Implementation of Application Traffic Classification & Restoring,TP393.08
  14. E-Government Network Security Analysis and Prevention Strategy,TP393.08
  15. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  16. Design of Network Intrusion Detection System Based on FPGA,TP393.08
  17. Research of Key Technologies of Intrusion Detection Based on Computer Immune,TP393.08
  18. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  19. Chain Enterprise Information Management System Design and Implementation of encryption technology,TP393.08
  20. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08
  21. Internet IP-level topology measurement space research,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile