Abstract

Recently, economic scenario is often facing securit y breach that has heavy impact on the financial soundness of a company particularly, stock prices o n firms. The utmost consequence being the whole business comes to a standstill. From the estimates attributed by the financial sector, it has been inf erred that the loss incurred on virus and worms attack is said to have the greatest impact that hampers the prosp erity of a business entity. Thus, security strategies attemp t on revolving around the act of security breach, t hereby targeting to curb the financial losses of a company totally or at least minimize the losses. If the op erating system of the stock market or financial sector gets corrupted the whole system need to be formatted, a new operating system has to be reinstalled and the anti virus software tends to be useless in such cases. I n this study, virus and worms are encountered using IPTraceback technique and network security is ensured. Th e effective integration of spectral analysis, worm de tection and IPTraceback, alerts the user dynamicall y and kills the source which distributes the virus. Real time traffic data are used for evaluating the perfo rmance.

Highlights

  • In today’s networked environment where the business 10 min causing disruption to financial and government is conducted electronically, security breaches have institutions and precluded any human based response

  • From the estimates attributed by the financial sector, it has been inferred that the loss incurred on virus and worms attack is said to have the greatest impact that hampers the prosperity of a business entity

  • The present study explores the capability of solving the problem if the source node was found by IPTraceback and by killing or terminating the source node

Read more

Summary

INTRODUCTION

Caused significant damage for example, the Slammer worm infected more than 90% of vulnerable hosts within. Propagation speed and avoid being detected (Yu et al., These concerns are due the fact that the consequence of 2010) These worms which avoid being detected are of security breach affects the financial position of the two types, namely static and dynamic worms. For example Atak (Zdnet, 2005) and few cases of internet worm attack are as follows: CodeRed worm in 2001 (Moore et al, 2002), the Slammer worm in 2003 (Moore et al, 2003) and the Witty/Sasser worms in 2004 (Casado et al, 2005) All these worms self-stopping worm (Ma et al, 2005) change their propagation pattern to avoid being detected and punished for their activities. It can be concluded that computer virus and worms cause tremendous financial losses to security breached companies especially stock exchange environment. Large amount of loss can be saved by arresting rapid spread of the virus and worms to more number of systems

System Architecture
Countermeasures
Spectrum Anlaysis
Worm Detector
IPTraceback
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.