Call for Paper - July 2019 Edition
IJCA solicits original research papers for the July 2019 Edition. Last date of manuscript submission is June 20, 2019. Read More

Novel Approach for Worm Detection using Modified CRC32 Algorithm

Print
PDF
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)
© 2012 by IJCA Journal
ncipet - Number 14
Year of Publication: 2012
Authors:
Avinash Wadhe
Nikita Mahajan
Rahul Suryawanshi

Avinash Wadhe, Nikita Mahajan and Rahul Suryawanshi. Article: Novel Approach for Worm Detection using Modified CRC32 Algorithm. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012) ncipet(14):1-5, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Avinash Wadhe and Nikita Mahajan and Rahul Suryawanshi},
	title = {Article: Novel Approach for Worm Detection using Modified CRC32 Algorithm},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)},
	year = {2012},
	volume = {ncipet},
	number = {14},
	pages = {1-5},
	month = {March},
	note = {Full text available}
}

Abstract

Computers are designed to execute instructions one after another. Those instructions normally do useful calculations, maintain databases and communicate with users on other systems. Sometimes, the instruction execution can be damaging or malicious in nature. When that happens by accident, we call it a code involved a software bug or cause an unexpected program behavior. If the instructions source are individual who intended that the occurrence of abnormal behavior, then we consider this as infected coding; such a code authorities sometimes referred as worm. There are lot of distinct forms of such software which are characterized by there behavior, how they are fired, and how they spread. Now-a-days, the media almost uniformly described occurrences of worms as computer viruses. One of the most high profile threats to information integrity is the computer virus and worms. This paper presenting how to mitigate the worms using the improved CRC32 approach and comparing the result with existing technique available for worm detection.

References

  • Qi Lilei, Huang e Xiantong (2011), “Research on Worms Spread and Control Strategy in Complex Networks”, IEEE
  • Shouhuai Xu, Wenlian Lu, and Zhenxin Zhan (2012),“A Stochastic Model of Multivirus Dynamics”, IEEE Computer Society.
  • Filipe Freitas, Edgar Marques, Rodrigo Rodrigues, Carlos Ribeiro, Paulo Ferreira, and Lu´is Rodrigues(2009),“Verme: Worm Containment in Overlay Networks”, IEEE.
  • Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham(2003),“A Taxonomy of Computer Worms” WORM’03, Washington, DC, USA. Copyright 2003 ACM 1581137850/ 03/0010
  • David J. Albanese, Michael J. Wiacek, Christopher M. Salter, Jeffrey A. Six (2004), “The Case for Using Layered Defenses to Stop Worms”.
  • Arun Bakshi, Vikas Dixit, Kaushal Mehta(2010),“Virus: A Menace for Information Security”, Global Journal of Enterprise Information System.
  • Craig Smith, Ashraf Matrawy, Stanley Chow, Bassem Abdelaziz(2009), “Computer Worms: Architectures, Evasion Strategies, and Detection Mechanisms”, Journal of Information Assurance and Security 4.
  • Cliff C. Zou, Don Towsley, Weibo Gong(2006),“On the performance of Internet worm scanning strategies”, Performance Evaluation 63.
  • Parbati Kumar Manna, Shigang Chen, Sanjay Ranka(2008),“Exact Modeling of Propagation for Permutation-Scanning Worms”, IEEE INFOCOM 2008.
  • Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien “A First Look at Peer-to-Peer Worms: Threats and Defenses”
  • Mathys Walma(2007),“Pipelined Cyclic Redundancy Check (CRC) Calculation” IEEE
  • Zornitza Genova Prodanoff and Ronnie King(2004),“CRC32 Based Signature Generation Methods for URL Routing”, IEEE.
  • http://www.ross.net/crc/download/crc_v3.txt
  • http://sobhan5968.blogfa.com/post-30.aspx
  • David J. Stang, “Computer Virus Survival Guide”,Page 35-39, Jun 1, 1991.