Sie sind auf Seite 1von 13

MODELING AND DETECTING OF CAMOUFLAGING WORM

Under The Guidance of R.Satya Rajendra Singh M.Tech

By: S.Krishna Singaraiah(08711A1252) P.Pavan Kumar(08711A1240) M.S.Sireesh Sai(08711A1224)

ABSTRACT:
Active worms causes major security threats to the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic.

INTRODUCTION:
An active worm refers to a malicious software program that propagates itself on the Internet to infect other computers. BOTNETS (a) Distributed Denial-of-Service (DDoS) (b) access confidential information that can be misused (c) destroy data that has a high monetary value (d) Spam E-Mails

SUPER BOTNETS

LITERATURE SURVEY:
Worm: self-replicating malware program A payload is code designed to do more than spread the wormit might delete files on a host system . Camouflage: A method of CRYPSISavoidance of observation. Anomaly Detection: Refers to detecting patterns in a given data set that do not conform to an established normal behavior.

EXISTING SYSTEM :
The C-Worm is quite different from traditional worms in which it camouflages any noticeable trends in the number of infected computers over time. The camouflage is achieved by manipulating the scan traffic volume of worm-infected computers. Such a manipulation of the scan traffic volume prevents exhibition of any exponentially increasing trends or even crossing of thresholds that are tracked by existing detection schemes.

DRAWBACK IN EXISTING SYSTEM:


C-Worm scan traffic shows no noticeable trends in the time domain, it demonstrates a distinct pattern in the frequency domain. Specifically, there is an obvious concentration within a narrow range of frequencies. This concentration within a narrow range of frequencies is inevitable since the C-Worm adapts to the dynamics of the Internet in a recurring manner for manipulating and controlling its overall scan traffic volume.

PROPOSED SYSTEM:
We adopt frequency domain analysis techniques and develop a detection scheme against Wide-spreading of the C-Worm. Particularly, we develop a novel spectrum-based detection scheme that uses the Power Spectral Density (PSD) distribution of scan traffic volume in the frequency domain and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from non worm traffic (background traffic).

ADVANTAGES IN PROPOSED SYSTEM :


Our evaluation data clearly demonstrate that our spectrum-based detection scheme achieves much better detection performance against the C-Worm propagation compared with existing detection schemes. Our evaluation also shows that our spectrum-based detection scheme is general enough to be used for effective detection of traditional worms as well.

Modules:
Centralized Data Center:

Monitoring:

User:

Report Preparation :

Report Distribution :

SYSTEM REQUIREMENTS: HARDWARE: PROCESSOR RAM MONITOR HARD DISK CDDRIVE SOFTWARE: Front End Back End Operating System IDE : : : : JAVA (SWINGS) MS SQL 2000/05 Windows XP/07 Net Beans, Eclipse : : : : : PENTIUM IV,2.6 GHz, Intel Core 2 Duo. 512 MB DD RAM 15 COLOR 40 GB LG 52X

CONCLUSION :

There By , We conclude that using the PSD & SFM Measures we are going to Model and Detect the active Camouflage Worm effectively and more efficiently than the existing mechanisms.

Das könnte Ihnen auch gefallen