Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks (original) (raw)
Abstract
This note is concerned with the executive compressed worm virus and their detection. It is difficult to detect some worm viruses recently since their file structure adopts the type of executive compression which can be run of themselves in the compressed state. In fact there are some informations about executive compression type in the sections of compressed file structure including whether it is executive compressed or not and compression method if compressed. In this research, we have adopted the reverse assembling method to investigate the effective method for detecting the many varietal malicious codes that are generated in different types by the variating the compression methods.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- Adam, J.: Virus Threats and Countermeasures. IEEE Spectrum (August 1992)
Google Scholar - Chess, D.: The Future of Viruses on the Internet. In: Proceedings Virus Bulletin International Conference (October 1997)
Google Scholar - Denning, P.: Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley, Reading (1990)
Google Scholar - Hoffman, L.: Rogue Programs: Viruses, Worms and Trojan Horses, New York, Van Nostrand Reinhold (1990)
Google Scholar - Nachenberg, C.: Computer Virus-Antivirus Coevolution. Communications of the ACM (January 1997)
Google Scholar - William, S.: Cryptography and Network Security Principles and Practics. Prence-Hall, Inc., New Jersey (1999)
Google Scholar
Author information
Authors and Affiliations
- Dept. of Information Security, Joongbu Univ., Korea
Seung-Jae Yoo - Dept. of Information Security Eng., Kyonggi Univ., Korea
Kuinam J. Kim
Authors
- Seung-Jae Yoo
- Kuinam J. Kim
Editor information
Editors and Affiliations
- Department of Computer Science, University of Calgary, 2500 University Drive N.W., T2N 1N4, Calgary, AB, Canada
Marina L. Gavrilova - Department of Mathematics and Computer Science, University of Perugia, via Vanvitelli, 1, I-06123, Perugia, Italy
Osvaldo Gervasi - William Norris Professor, Head of the Computer Science and Engineering Department, University of Minnesota, USA
Vipin Kumar - OptimaNumerics Ltd., Cathedral House, 23-31 Waring Street, BT1 2DX, Belfast, UK
C. J. Kenneth Tan - Clayton School of IT, Monash University, 3800, Clayton, Australia
David Taniar - Department of Chemistry, University of Perugia, Via Elce di Sotto, 8, I-06123, Perugia, Italy
Antonio Laganá - School of Computing, Soongsil University, Seoul, Korea
Youngsong Mun - School of Information and Communication Engineering, Sungkyunkwan University, Korea
Hyunseung Choo
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoo, SJ., Kim, K.J. (2006). Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588\_108
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/11751588\_108
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-34072-0
- Online ISBN: 978-3-540-34074-4
- eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science