Modeling and Detecting c Worm

13
MODELING AND DETECTING OF CAMOUFLAGING WORM By: S.Krishna Singaraiah(08711A1252) P.Pavan Kumar(08711A1240) M.S.Sireesh Sai(08711A1224) Under The Guidance of R.Satya Rajendra Singh M.Tech

Transcript of Modeling and Detecting c Worm

Page 1: Modeling and Detecting c Worm

MODELING AND DETECTING OF CAMOUFLAGING WORM

By:S.Krishna Singaraiah(08711A1252)P.Pavan Kumar(08711A1240)M.S.Sireesh Sai(08711A1224)

Under The Guidance of R.Satya Rajendra Singh M.Tech

Page 2: Modeling and Detecting c Worm

ABSTRACT:

Active worm’s causes major security threats to the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms.

Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic.

Page 3: Modeling and Detecting c Worm

INTRODUCTION:

• An active worm refers to a malicious software program that propagates itself on the Internet to infect other computers.

• BOTNETS (a) Distributed Denial-of-Service (DDoS) (b) access confidential information that can be misused (c) destroy data that has a high monetary value (d) Spam E-Mails

• SUPER BOTNETS

Page 4: Modeling and Detecting c Worm

LITERATURE SURVEY:

• Worm: self-replicating malware program

A payload is code designed to do more than spread the worm–it might delete files on a host system .

• Camouflage: A method of CRYPSIS—avoidance of observation.

• Anomaly Detection:Refers to detecting patterns in a given data set that do not conform to an established normal behavior.

Page 5: Modeling and Detecting c Worm

EXISTING SYSTEM :

The C-Worm is quite different from traditional worms in which it camouflages any noticeable trends in the number of infected computers over time. The camouflage is achieved by manipulating the scan traffic volume of worm-infected computers. Such a manipulation of the scan traffic volume prevents exhibition of any exponentially increasing trends or even crossing of thresholds that are tracked by existing detection schemes.

DRAWBACK IN EXISTING SYSTEM: C-Worm scan traffic shows no noticeable trends in the time domain, it demonstrates a distinct pattern in the frequency domain. Specifically, there is an obvious concentration within a narrow range of frequencies. This concentration within a narrow range of frequencies is inevitable since the C-Worm adapts to the dynamics of the Internet in a recurring manner for manipulating and controlling its overall scan traffic volume.

Page 6: Modeling and Detecting c Worm

PROPOSED SYSTEM:We adopt frequency domain analysis techniques and develop a

detection scheme against Wide-spreading of the C-Worm. Particularly, we develop a novel spectrum-based detection scheme that uses the Power Spectral Density (PSD) distribution of scan traffic volume in the frequency domain and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from non worm traffic (background traffic).

ADVANTAGES IN PROPOSED SYSTEM :

Our evaluation data clearly demonstrate that our spectrum-based detection scheme achieves much better detection performance against the C-Worm propagation compared with existing detection schemes. Our evaluation also shows that our spectrum-based detection scheme is general enough to be used for effective detection of traditional worms as well.

Page 7: Modeling and Detecting c Worm

Monitoring:

Modules:

Centralized Data Center:

Page 8: Modeling and Detecting c Worm

User:

Report Preparation :

Page 9: Modeling and Detecting c Worm

Report Distribution :

Page 10: Modeling and Detecting c Worm

SYSTEM REQUIREMENTS: HARDWARE:

PROCESSOR : PENTIUM IV,2.6 GHz, Intel Core 2 Duo.RAM : 512 MB DD RAMMONITOR : 15” COLORHARD DISK : 40 GBCDDRIVE : LG 52X

SOFTWARE:

Front End : JAVA (SWINGS)Back End : MS SQL 2000/05Operating System : Windows XP/07IDE : Net Beans, Eclipse

Page 11: Modeling and Detecting c Worm

CONCLUSION :

There By , We conclude that using the PSD & SFM Measures we are going to Model and Detect the active Camouflage – Worm effectively and more efficiently than the existing mechanisms.

Page 12: Modeling and Detecting c Worm
Page 13: Modeling and Detecting c Worm

?