Abstract
With the proliferation of the internet among casual users as well as businesses, the range and frequency of security threats have increased dramatically. One of these threats is a particular type of malware known as a polymorphic worm. This is a program that can mutate its appearance with each infection and spreads through the network via semantics-preserving code manipulation methods or self-encryption techniques. This paper describes the characteristics of polymorphic worms and then explains the most common forms of pattern based detection, such as Autograph.
Original language | English |
---|---|
Title of host publication | ICEMIS 2015 - International Conference on Engineering and MIS 2015 |
Publisher | Association for Computing Machinery |
Volume | 24-26-September-2015 |
ISBN (Electronic) | 9781450334181 |
DOIs | |
Publication status | Published - 24 Sept 2015 |
Event | 2015 International Conference on Engineering and MIS, ICEMIS 2015 - Istanbul, Turkey Duration: 24 Sept 2015 → 26 Sept 2015 |
Conference
Conference | 2015 International Conference on Engineering and MIS, ICEMIS 2015 |
---|---|
Country/Territory | Turkey |
City | Istanbul |
Period | 24/09/15 → 26/09/15 |
Keywords
- IDS
- Pattern
- Polymorphic Worms
- Security
- Vulnerability