FROM THE JOURNAL
TIU Transaction on Inteligent Computing
Avijit Mondal; Anoy Chowdhury; R.T Goswami
Techno India University, West Bengal, Kolkata 700091, India
In cyber world, the major problem is to detect malicious objects mainly newly invented programs. Though there is some pre-used methodology to detect old attacks, because they have previous signature generation approach. But when a new attack comes in situation, it’s very difficult to detect the attack pattern.
In this paper we have proposed a methodology to detect malicious objects specially worm attacks and a proposed algorithm to generate signature for Worm. Our proposed technique is optimal cost technique too. We have used Double-Honeypot architecture to implement the technology.
Keywords- Honeypot; Malicious objects; Worm; Double-Honeypot