THE EXAMINING OF WORMS USING REAL TIME TRACES AND SIMULATIONS

Muntasser A. Wahsh, Mahdi A. Maan, Wael J. Abed

Abstract


Hostile code has been the most forthcoming threat to the internet. Worms are utilizing different scanning procedure to spread quickly. Worms that select, examine destinations anxious can cause more harm than worms recruiting random scan. Common worm perception, planning that monitors malware activities. Calculate and set of rules to examine the development of worms using real time traces and simulations.


Refbacks

  • There are currently no refbacks.