In cyber world, the major problem is to detect malicious objects mainly newly invented programs. Though there is some pre-used methodology to detect old attacks, because they have previous signature generation approach. But when a new attack comes in situation, it’s very difficult to detect the attack pattern. In this paper we have proposed a methodology to detect malicious objects specially worm attacks and a proposed algorithm to generate signature for Worm. Our proposed technique is optimal cost technique too. We have used Double-Honeypot architecture to implement the technology.
Keywords: Honeypot, Malicious Objects, Worm, Double-Honeypot