Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de
Introduction. Worm Attacks. Attack Detection Approaches. Automated Signature Generation Systems. Design of Double-honeynet System. Signature Generation Algorithms for Polymorphic Worms. Experimental Investigation of Double-honeynet System. Experimental Implementation of Signature generation Algorithms. What to Expect in the Coming Days?