Abstract

Networking provides the main infrastructure for different recent applications. These applications are targets for different types of attack. In this paper a structured literature for different types of attacks has been proposed. It presents worms attacks. Latest network security technologies are investigated, the current situation and increasing demand for robust network security is analyzed. For security specialist it is vital to make difference any reproducing programs, which may not harm your system, and it closer forms. Worms is one of the most common propagation attacks over the internet. Worm to propagate it can use two methods: finding any vulnerable devices in the network and propagate using topological neighbors. Investigating the methods of worm propagation can provide a clearer vision on how worms propagate and how to defense and prevent such type of attacks. Last decade different mechanisms for detection and defensing have been proposed to deal with the worm attacks. A detailed methodology is proposed to overcome worm attack mechanisms. Based on which different attributes of information security have been analyzed which includes integrity, confidentiality, availability, authentication, non-repudiation and access control.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call