Generating High-Quality Signature for Worm attack using Extended Honeypot Framework in Network Security Domain
In cyberspace, a critical issue is detecting the currently emerged malicious programs. You will find important methodologies to identify the first recognized malicious programs although not for recently emerged malicious programs. In general, the commonly relevant strategy to identify the first recognized malicious programs is signature-based detection. But for innovative malicious items absolutely no signature is been around to the past, consequently, they can't be recognized by utilizing the technique. Innovative malicious items may just be recognized through the use of signature-based strategy after a major damage of the property, as the signature is produced between the periods. The strategy isn't just economical but additionally better compared to some other methods in some conditions like in the Intranet that is getting much more than just one LANs and even each LAN is running double honeypot. In this particular paper, we have proposed a practice to detect malicious objects especially worm attacks and a proposed algorithm to generate a signature for Worm. Our proposed technique is also an optimal cost technique.