An overview about the polymorphic worms signatures

Raja A. Moftah, Abdelsalam M. Maatuk, Peter Plassmann, Shadi Aljawarneh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

With the proliferation of the internet among casual users as well as businesses, the range and frequency of security threats have increased dramatically. One of these threats is a particular type of malware known as a polymorphic worm. This is a program that can mutate its appearance with each infection and spreads through the network via semantics-preserving code manipulation methods or self-encryption techniques. This paper describes the characteristics of polymorphic worms and then explains the most common forms of pattern based detection, such as Autograph.

Original languageEnglish
Title of host publicationICEMIS 2015 - International Conference on Engineering and MIS 2015
PublisherAssociation for Computing Machinery
Volume24-26-September-2015
ISBN (Electronic)9781450334181
DOIs
Publication statusPublished - 24 Sept 2015
Event2015 International Conference on Engineering and MIS, ICEMIS 2015 - Istanbul, Turkey
Duration: 24 Sept 201526 Sept 2015

Conference

Conference2015 International Conference on Engineering and MIS, ICEMIS 2015
Country/TerritoryTurkey
CityIstanbul
Period24/09/1526/09/15

Keywords

  • IDS
  • Pattern
  • Polymorphic Worms
  • Security
  • Vulnerability

Fingerprint

Dive into the research topics of 'An overview about the polymorphic worms signatures'. Together they form a unique fingerprint.

Cite this