CFP last date
20 December 2024
Reseach Article

Novel Approach for Worm Detection using Modified CRC32 Algorithm

Published on March 2012 by Avinash Wadhe, Nikita Mahajan, Rahul Suryawanshi
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 14
March 2012
Authors: Avinash Wadhe, Nikita Mahajan, Rahul Suryawanshi
7a3cb73c-efb9-4799-b81f-c6378a60987c

Avinash Wadhe, Nikita Mahajan, Rahul Suryawanshi . Novel Approach for Worm Detection using Modified CRC32 Algorithm. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 14 (March 2012), 1-5.

@article{
author = { Avinash Wadhe, Nikita Mahajan, Rahul Suryawanshi },
title = { Novel Approach for Worm Detection using Modified CRC32 Algorithm },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 14 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/ncipet/number14/5293-1105/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Avinash Wadhe
%A Nikita Mahajan
%A Rahul Suryawanshi
%T Novel Approach for Worm Detection using Modified CRC32 Algorithm
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 14
%P 1-5
%D 2012
%I International Journal of Computer Applications
Abstract

Computers are designed to execute instructions one after another. Those instructions normally do useful calculations, maintain databases and communicate with users on other systems. Sometimes, the instruction execution can be damaging or malicious in nature. When that happens by accident, we call it a code involved a software bug or cause an unexpected program behavior. If the instructions source are individual who intended that the occurrence of abnormal behavior, then we consider this as infected coding; such a code authorities sometimes referred as worm. There are lot of distinct forms of such software which are characterized by there behavior, how they are fired, and how they spread. Now-a-days, the media almost uniformly described occurrences of worms as computer viruses. One of the most high profile threats to information integrity is the computer virus and worms. This paper presenting how to mitigate the worms using the improved CRC32 approach and comparing the result with existing technique available for worm detection.

References
  1. Qi Lilei, Huang e Xiantong (2011), “Research on Worms Spread and Control Strategy in Complex Networks”, IEEE
  2. Shouhuai Xu, Wenlian Lu, and Zhenxin Zhan (2012),“A Stochastic Model of Multivirus Dynamics”, IEEE Computer Society.
  3. Filipe Freitas, Edgar Marques, Rodrigo Rodrigues, Carlos Ribeiro, Paulo Ferreira, and Lu´is Rodrigues(2009),“Verme: Worm Containment in Overlay Networks”, IEEE.
  4. Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham(2003),“A Taxonomy of Computer Worms” WORM’03, Washington, DC, USA. Copyright 2003 ACM 1581137850/ 03/0010
  5. David J. Albanese, Michael J. Wiacek, Christopher M. Salter, Jeffrey A. Six (2004), “The Case for Using Layered Defenses to Stop Worms”.
  6. Arun Bakshi, Vikas Dixit, Kaushal Mehta(2010),“Virus: A Menace for Information Security”, Global Journal of Enterprise Information System.
  7. Craig Smith, Ashraf Matrawy, Stanley Chow, Bassem Abdelaziz(2009), “Computer Worms: Architectures, Evasion Strategies, and Detection Mechanisms”, Journal of Information Assurance and Security 4.
  8. Cliff C. Zou, Don Towsley, Weibo Gong(2006),“On the performance of Internet worm scanning strategies”, Performance Evaluation 63.
  9. Parbati Kumar Manna, Shigang Chen, Sanjay Ranka(2008),“Exact Modeling of Propagation for Permutation-Scanning Worms”, IEEE INFOCOM 2008.
  10. Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien “A First Look at Peer-to-Peer Worms: Threats and Defenses”
  11. Mathys Walma(2007),“Pipelined Cyclic Redundancy Check (CRC) Calculation” IEEE
  12. Zornitza Genova Prodanoff and Ronnie King(2004),“CRC32 Based Signature Generation Methods for URL Routing”, IEEE.
  13. http://www.ross.net/crc/download/crc_v3.txt
  14. http://sobhan5968.blogfa.com/post-30.aspx
  15. David J. Stang, “Computer Virus Survival Guide”,Page 35-39, Jun 1, 1991.
Index Terms

Computer Science
Information Sciences

Keywords

Worms CRC32 Modified CRC32