0% found this document useful (0 votes)
24 views1 page

Abstract Major

The document describes a project to model and detect the spread of self-replicating computer worms. The project uses a branching process model to characterize how random scanning worms propagate. It scans for worms by monitoring host IP addresses and infection status. Detected worms are categorized. Containment is achieved by restricting the number of scans each host can perform to unique IP addresses. The schemes were implemented and coded in Java.

Uploaded by

Shannon Parker
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views1 page

Abstract Major

The document describes a project to model and detect the spread of self-replicating computer worms. The project uses a branching process model to characterize how random scanning worms propagate. It scans for worms by monitoring host IP addresses and infection status. Detected worms are categorized. Containment is achieved by restricting the number of scans each host can perform to unique IP addresses. The schemes were implemented and coded in Java.

Uploaded by

Shannon Parker
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ABSTRACT

Self propagating codes, which eat up computer memory, are worms. In our project, we develop a scheme to model a process to the spread pf worms, then detect them. We develop our project, using the following modules. Branching Process Model Scanning for worms Detecting-categorizing worms Containment of worms

Branching Process Model Used to characterize the propagation of random scanning worms . Scanning worms are those that generate a list of random IP addresses to scan from a vulnerable host. Scanning for worms By this process, we intensively keep an eye over the model, by tracking the IP address of the HOST, and find how they are infected or not. Detecting-categorizing worms The typical detecting approach consists of waiting for a number of computers to be infected. Detecting the worms, designing a solution, and delivering and deploying the solution. Containment of worms The containment system is based on the idea of restricting the total number of scans to unique IP addresses by any host.

Finally, We implement the different schemes and code them in Java, and execute in Java platform.

Submitted By: Anamika choudhary(09CS009) Anchal Goyal(09CS010) CSE A Batch

You might also like