Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks (original) (raw)

Abstract

This note is concerned with the executive compressed worm virus and their detection. It is difficult to detect some worm viruses recently since their file structure adopts the type of executive compression which can be run of themselves in the compressed state. In fact there are some informations about executive compression type in the sections of compressed file structure including whether it is executive compressed or not and compression method if compressed. In this research, we have adopted the reverse assembling method to investigate the effective method for detecting the many varietal malicious codes that are generated in different types by the variating the compression methods.

Preview

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adam, J.: Virus Threats and Countermeasures. IEEE Spectrum (August 1992)
    Google Scholar
  2. Chess, D.: The Future of Viruses on the Internet. In: Proceedings Virus Bulletin International Conference (October 1997)
    Google Scholar
  3. Denning, P.: Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley, Reading (1990)
    Google Scholar
  4. Hoffman, L.: Rogue Programs: Viruses, Worms and Trojan Horses, New York, Van Nostrand Reinhold (1990)
    Google Scholar
  5. Nachenberg, C.: Computer Virus-Antivirus Coevolution. Communications of the ACM (January 1997)
    Google Scholar
  6. William, S.: Cryptography and Network Security Principles and Practics. Prence-Hall, Inc., New Jersey (1999)
    Google Scholar

Download references

Author information

Authors and Affiliations

  1. Dept. of Information Security, Joongbu Univ., Korea
    Seung-Jae Yoo
  2. Dept. of Information Security Eng., Kyonggi Univ., Korea
    Kuinam J. Kim

Authors

  1. Seung-Jae Yoo
  2. Kuinam J. Kim

Editor information

Editors and Affiliations

  1. Department of Computer Science, University of Calgary, 2500 University Drive N.W., T2N 1N4, Calgary, AB, Canada
    Marina L. Gavrilova
  2. Department of Mathematics and Computer Science, University of Perugia, via Vanvitelli, 1, I-06123, Perugia, Italy
    Osvaldo Gervasi
  3. William Norris Professor, Head of the Computer Science and Engineering Department, University of Minnesota, USA
    Vipin Kumar
  4. OptimaNumerics Ltd., Cathedral House, 23-31 Waring Street, BT1 2DX, Belfast, UK
    C. J. Kenneth Tan
  5. Clayton School of IT, Monash University, 3800, Clayton, Australia
    David Taniar
  6. Department of Chemistry, University of Perugia, Via Elce di Sotto, 8, I-06123, Perugia, Italy
    Antonio Laganá
  7. School of Computing, Soongsil University, Seoul, Korea
    Youngsong Mun
  8. School of Information and Communication Engineering, Sungkyunkwan University, Korea
    Hyunseung Choo

Rights and permissions

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoo, SJ., Kim, K.J. (2006). Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588\_108

Download citation

Publish with us