ABSTRACT

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de

chapter 1|24 pages

The Fundamental Concepts

chapter 2|22 pages

Computer Networking

chapter 4|42 pages

Honeypots

chapter 5|32 pages

Internet Worms

chapter 9|22 pages

Developed Signature Generation Algorithms