Abstract
A high percentage of information attacks are perpetrated by deploying computer viruses and worms, which result in very costly and destructive “epidemics”. Spread of malicious codes is achieved by the built-in ability to self-replicate through the Internet and computer media. Since most legitimate codes do not self-replicate, and the number of ways to achieve self-replication is limited to the order of fifty, the detection of malicious codes could be reduced to the detection of the “gene of self-replication” in the code in question. This paper present the analysis of the self-replication mechanism of one of the recent computer viruses and discusses the ways to detect the ability of a computer code to self-replicate before the execution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Skormin, V.: A Biological Approach to System Information Security (BASIS). A New Paradigm in Autonomic Information Assurance. CONTRACT #30602-01-0509. Report to the AFRL at Rome NY. Binghamton NY (2002)
Leitold, F.: Mathematical Model of Computer Viruses. In: EICAR 2000 Best Paper Proceedings, pp. 194–217 (2000)
Skormin, V., Summerville, D., Moronski, J., Sidoran, J.: Application of Genetic Optimization and Statistical Analysis for Detecting Attacks on a Computer Network. In: Proceedings of the Real-time Intrusion Detection NATO Symposium, Lisbon, Portugal, May 27–29 (2002)
Tarakanov, A.O., Skormin, V.A., Sokolova, S.P.: Immunocomputing. In: Principles and Applications. Springer, New York (2003)
Drosnin, M.: The Bible Code. Simon & Schuster, New York (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Skormin, V.A., Summerville, D.H., Moronski, J.S. (2003). Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive