Novel Approach for Worm Detection using Modified CRC32 Algorithm

2012 
Computers are designed to execute instructions one after another. Those instructions normally do useful calculations, maintain databases and communicate with users on other systems. Sometimes, the instruction execution can be damaging or malicious in nature. When that happens by accident, we call it a code involved a software bug or cause an unexpected program behavior. If the instructions source are individual who intended that the occurrence of abnormal behavior, then we consider this as infected coding; such a code authorities sometimes referred as worm. There are lot of distinct forms of such software which are characterized by there behavior, how they are fired, and how they spread. Now-a-days, the media almost uniformly described occurrences of worms as computer viruses. One of the most high profile threats to information integrity is the computer virus and worms. This paper presenting how to mitigate the worms using the improved CRC32 approach and comparing the result with existing technique available for worm detection.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    1
    Citations
    NaN
    KQI
    []