Open Access Open Access  Restricted Access Subscription Access

Snort Rule Technique For Detecting Worm Attacks


 

All over the world, the computerization gets increases and it is really hard task to provide security for the systems connected to the network. In 1988, Morris worm proved that, it can bring the internet down in hours which lead to large queuing delays and high packet loss. So the security of networking will make us to prevent all the confidential data to be maintained safely without any loss. Amongst the various security risks, worm attack is the most severe attack threat, that can be easily self replicated and uses a network to send copies of itself to other end terminals on the network without any user intervention. To avoid such attacks, a technique called Snort rules is proposed to secure the network. It will detect the worms by analyzing the probable paths where they tend to copy themselves. As a summary, the paper shows that Snort rules technique is faster in detecting any kind of worms and provide full authentication to the network.


Keywords

Worms, self-propagating security, Internet worm detection
User
Notifications
Font Size

Abstract Views: 132

PDF Views: 1




  • Snort Rule Technique For Detecting Worm Attacks

Abstract Views: 132  |  PDF Views: 1

Authors

Abstract


All over the world, the computerization gets increases and it is really hard task to provide security for the systems connected to the network. In 1988, Morris worm proved that, it can bring the internet down in hours which lead to large queuing delays and high packet loss. So the security of networking will make us to prevent all the confidential data to be maintained safely without any loss. Amongst the various security risks, worm attack is the most severe attack threat, that can be easily self replicated and uses a network to send copies of itself to other end terminals on the network without any user intervention. To avoid such attacks, a technique called Snort rules is proposed to secure the network. It will detect the worms by analyzing the probable paths where they tend to copy themselves. As a summary, the paper shows that Snort rules technique is faster in detecting any kind of worms and provide full authentication to the network.


Keywords


Worms, self-propagating security, Internet worm detection