Rogue programs: viruses, worms and Trojan horses
Rogue programs: viruses, worms and Trojan horses
Computers under attack: intruders, worms, and viruses
Computers under attack: intruders, worms, and viruses
IEEE Spectrum
Computer virus-antivirus coevolution
Communications of the ACM
Event-driven architecture based on patterns for detecting complex attacks
International Journal of Critical Computer-Based Systems
Hi-index | 0.00 |
In this paper, we try to construct the searching and treatment modules to count the malignant programs effectively so that the Worm virus detection & blocking program has the functions that it can check the files early to cope the Worm virus attacks by intercepting the value of interrupt vector table of memory structure for checking the action of viruses, and comparing with the character strings of virus. Also check the facts that files are deformed or not by generating the statistics sum of encrypting file and check the facts that files are infected or not by the pattern checking of all executable files.