A hybrid algorithm for detecting computer worms

碩士 === 國立交通大學 === 管理學院碩士在職專班資訊管理組 === 96 === In recent years, some "Computer Viruses" of dispersal increases quickly on the network. Generally, computer viruses included various computer programs which have the ability to infection, replication and break or influence a computer‘s operate....

Full description

Bibliographic Details
Main Authors: Ying-Yu Chen, 陳英裕
Other Authors: Chi-Chun Lo
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/41684820970730514093
id ndltd-TW-096NCTU5396006
record_format oai_dc
spelling ndltd-TW-096NCTU53960062016-05-18T04:13:16Z http://ndltd.ncl.edu.tw/handle/41684820970730514093 A hybrid algorithm for detecting computer worms 一個針對電腦蠕蟲防治的混合偵測演算法 Ying-Yu Chen 陳英裕 碩士 國立交通大學 管理學院碩士在職專班資訊管理組 96 In recent years, some "Computer Viruses" of dispersal increases quickly on the network. Generally, computer viruses included various computer programs which have the ability to infection, replication and break or influence a computer‘s operate. Earlier computer viruses infection depends on file commutation, computer usually have the destructiveness of certain degree after infecting. For example: Can't boot, file damage, show error message and system resource overhead etc. Its form can be divided into these type: "Boot Viruses", "Windows Viruses", "Java/ActiveX Viruses", "Script Viruses", "Macro Viruses". Different from traditional computer viruses, the near future computer viruses ascends other computers by infection network through advanced infection skill. Its form can be divided into "PE program", "Trojans Horse Programs", "Spyware", “Computer Worm" and "Backdoors Programs" etc. Compare with the earlier computer viruses, these types computer viruses influence toward computer security and threat are rapid to increase. Currently the anti-virus software of widespread usage, the process of build virus pattern, deploy to computer and clear computer viruses still have time margin, this thesis begins the study of describe the become reason, characteristic, the way of spreads and infection, influence, threats and resolve solution of computer viruses. Then focused in to computer worms that with the best ability of infection and spread quickest. Through the “Hybrid Algorithm” by using “Negative form list“ and “Parallel ratio method” mixture with “Positive form list” and “Decision tree model” to detecting and analyzing computer worms. Through “Hybrid Algorithm”, we can detect the system abnormality quickly, when we analyzing it, this method also can define the characteristic of computer worms and produce a set of simple tool to help network administrator to clear computer worms in a short time, reduce the time to wait for update anti-virus pattern and can raise the protection ability of the operation system. Chi-Chun Lo 羅濟群 2008 學位論文 ; thesis 49 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 管理學院碩士在職專班資訊管理組 === 96 === In recent years, some "Computer Viruses" of dispersal increases quickly on the network. Generally, computer viruses included various computer programs which have the ability to infection, replication and break or influence a computer‘s operate. Earlier computer viruses infection depends on file commutation, computer usually have the destructiveness of certain degree after infecting. For example: Can't boot, file damage, show error message and system resource overhead etc. Its form can be divided into these type: "Boot Viruses", "Windows Viruses", "Java/ActiveX Viruses", "Script Viruses", "Macro Viruses". Different from traditional computer viruses, the near future computer viruses ascends other computers by infection network through advanced infection skill. Its form can be divided into "PE program", "Trojans Horse Programs", "Spyware", “Computer Worm" and "Backdoors Programs" etc. Compare with the earlier computer viruses, these types computer viruses influence toward computer security and threat are rapid to increase. Currently the anti-virus software of widespread usage, the process of build virus pattern, deploy to computer and clear computer viruses still have time margin, this thesis begins the study of describe the become reason, characteristic, the way of spreads and infection, influence, threats and resolve solution of computer viruses. Then focused in to computer worms that with the best ability of infection and spread quickest. Through the “Hybrid Algorithm” by using “Negative form list“ and “Parallel ratio method” mixture with “Positive form list” and “Decision tree model” to detecting and analyzing computer worms. Through “Hybrid Algorithm”, we can detect the system abnormality quickly, when we analyzing it, this method also can define the characteristic of computer worms and produce a set of simple tool to help network administrator to clear computer worms in a short time, reduce the time to wait for update anti-virus pattern and can raise the protection ability of the operation system.
author2 Chi-Chun Lo
author_facet Chi-Chun Lo
Ying-Yu Chen
陳英裕
author Ying-Yu Chen
陳英裕
spellingShingle Ying-Yu Chen
陳英裕
A hybrid algorithm for detecting computer worms
author_sort Ying-Yu Chen
title A hybrid algorithm for detecting computer worms
title_short A hybrid algorithm for detecting computer worms
title_full A hybrid algorithm for detecting computer worms
title_fullStr A hybrid algorithm for detecting computer worms
title_full_unstemmed A hybrid algorithm for detecting computer worms
title_sort hybrid algorithm for detecting computer worms
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/41684820970730514093
work_keys_str_mv AT yingyuchen ahybridalgorithmfordetectingcomputerworms
AT chényīngyù ahybridalgorithmfordetectingcomputerworms
AT yingyuchen yīgèzhēnduìdiànnǎorúchóngfángzhìdehùnhézhēncèyǎnsuànfǎ
AT chényīngyù yīgèzhēnduìdiànnǎorúchóngfángzhìdehùnhézhēncèyǎnsuànfǎ
AT yingyuchen hybridalgorithmfordetectingcomputerworms
AT chényīngyù hybridalgorithmfordetectingcomputerworms
_version_ 1718270823470465024