2018 21st Saudi Computer Society National Computer Conference (NCC) 2018
DOI: 10.1109/ncg.2018.8593085
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Zero-day Polymorphic Worm: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…They have been extensively studied and found posing the most damaging threats to IoT and its applications. 5 Polymorphic worms can easily evade detection through changing their appearance, such as altering their byte sequence or varying their payload via compression, encryption, among other methods required no human intervention. 6 Replicating themselves to appear differently in each infection makes polymorphic worms survive longer in a network.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…They have been extensively studied and found posing the most damaging threats to IoT and its applications. 5 Polymorphic worms can easily evade detection through changing their appearance, such as altering their byte sequence or varying their payload via compression, encryption, among other methods required no human intervention. 6 Replicating themselves to appear differently in each infection makes polymorphic worms survive longer in a network.…”
Section: Introductionmentioning
confidence: 99%
“…Fast detection and prevention against polymorphic worms have become more imperative. 5,7,8 Researchers have been working hard to develop defensive methods against them, for example, signature-based detection, statistical-based detection, behavior-based detection, and for forth. Generating reliable signatures to detect polymorphic worms is one of such means.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Research indicates that for every breakthrough in security, a new lope hole or zero day is created and this is not attended by the media. Zero-Day have a form of impacting organizations and people in general, after a large time of activity incognito [5]. It is throughout research and investigation that recurs to techniques such as forensics and threat analysis, that societies can anticipate the impact of a zero-day vulnerability, towards a more secure use of technology [6].…”
Section: Introductionmentioning
confidence: 99%