Free Essay

Can Norton Antivirus Detect Worm’s Virus?

In:

Submitted By karak
Words 627
Pages 3
Can Norton antivirus detect worm’s virus?
Fadi M.S Al-suhimat

Recent Internet worm outbreaks have infected hundreds of thousands of Internet servers and user machines within minutes, causing billions of dollars in losses for businesses, governments, and service providers. The high stakes involved have inspired numerous research projects, through which industry and academic institutions are working to strengthen local-area and wide-area networked systems’ abilities to fend off cyber-attacks. To that end, we propose to find new algorithm to detect internet worm viruses deploying fast, scalable security overlay networks to facilitate high-speed intrusion detection and alert-information exchange by depend on failure connection. Fortifying the Internet infrastructure with such a solution could benefit many security-sensitive applications, such as digital government, critical infrastructures, grid computing, e-commerce, and law enforcement. The broader impacts are far reaching in science, education, business, and homeland security. Currently, the internet is getting close to the persons’ life. They login internet to chat with others, download files or browse Web Pages. The internet is also playing an important role in the economy of country. Once the internet breaks down, it will cause an enormous economic loss. Worms is a serious security threat that may cause network congestion and internet break down. Anti-virus software scans files regularly for unusual changes in a file size, programs that match the software's database of known viruses, suspicious email attachments, and other warning signs. Anti-virus compares the signature stored in its database with file structure. If the file contain same signature, so it is infected with the worm, the anti-virus will detect it. The anti-virus database must then be updated continuously to detect new worms. The internet worm is dangerous because it spread very fast and anti-virus are too slow to detect. Anti-virus cannot detect unknown internet worm automatically because it not depend on behavioral internet worm but depend on signature to detect it. Worm containment must be automatic to have any chance of success because worms spread too fast for humans to respond. Ever since the Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Internet down in hours, new worm outbreaks have occurred periodically even though their mechanism of spreading was long well understood. Norton Antivirus (NAV) is a popular product of Symantec Corporation and is one of the most widely used antivirus programs. Its function is to detect and remove viruses, spyware, adware, and other potential security risks. Norton Antivirus is sold as a standalone product and is also included as part of Norton Internet Security and Norton System Works. There is also a standalone corporate version called Symantec Antivirus Corporate Edition. It is aimed at centrally managed corporate environments and has features not present in the retail version of the software.
We propose to find a new algorithm and early warning system for detect Internet worms to provide an accurate triggering signal for mitigation mechanisms in the early stage of a future worm. Such proposal is needed in view of the propagation scale and speed of the past worms. Although we have been lucky that the previous worms have not been very malicious, the same cannot be said for the future worms. Based on the idea “detecting the trend, not the rate” of monitored illegitimated scan traffic, we try to present our algorithm to detect the presence of an internet worm virus in its early stage. The analysis and simulation studies indicate that such a system is feasible, and the “trend detection” methodology poses many interesting research issues. We hope this paper would generate interests of discussion and participation in this topic and eventually lead to an effective monitoring and early warning system.

Similar Documents

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Premium Essay

Ethics

...RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Microsoft, Windows 95, Windows 98, Windows 2000,...

Words: 204343 - Pages: 818