Got To Home PageGo To Home Page
 Home   Author Guidelines   Review TOS   Sign Up FREE   Submit Articles   Member Login   Computer Guides

WhiteSmoke: Write here. Right now!


English Grammar Writing Software - Whitesmoke takes your writing from simple to sophisticate. Grammar, spelling, and punctuation checks plus a vast dictionary and thesaurus work to improve your texts.

Home | Internet | Technologies

New Ways To Prevent Internet Worms From Invading Your Computer Network

Are you having a hard time figuring out why your computer or internet is running slow? Well, this may be a case of internet worm attack. The world of computer technology has something to offer to answer this problem.

An internet worm is a virus that reproduces itself and sticks to other programs on your computer. A worm can duplicate itself around the whole network, and usually worms are source of malicious deeds, can consume resources, may overflow the Net with junk traffic, and in severe cases, they can even cause your computer system to shut down.

In a recent study in Ohio, young scientists from Ohio State University may have discovered a new technology to prevent internet worms from invading your computer system. The newly found method is self-regulating and detects worms within minutes as soon as computer networks are penetrated. This self-regulating technology will enable network administrators to easily detect worms then insulate infected programs and place them in quarantine for fixing.

A student and his colleagues of the Ohio Eminent Scholar in Networking and Communications at Ohio State University characterize their approach in the current "can of worm" IEEE Transactions on Dependable and Secure Computing.

The Ohio State University scholars found a new approach to this problem in computer technology. They need to find a way to contain the most infectious kind of worm that scans the internet to search for unprotected hosts to infect.

For example, a random scanning worm caused $2.6 billion on lost productivity to businesses worldwide in 2001. That worm was called Red Code. For this reason, young scientists have searched for early detection technology that will help network administrators find worms before they cause substantial damage to the network.

The new technology, they discovered, is for a certain software program to detect the number of scans sent out on a network. An early detection sign will appear when a machine begins sending out too many scans; therefore administrators should take it offline and perform virus check.

Every time we use search engines, a scan is made. A scan is a search for internet addresses. In the case of worms, it quickly sends out many scans to a lot of different destinations in search of vulnerable machines to infect. A worm has to hit a lot of IP address in a short span of time in order to survive.

In a simulation performed by the Ohio State University scholars, they were able to stop the spread of the infection to 150 hosts on the whole internet, 95 percent of the time. As a result, it shows that there was a dramatic decline in the spread of the worm.

To perform this strategy, network administrators would require them to install software that will monitor the number of scans on their networks, and would have to put up with some downtime among computers when they begin quarantine.

This method would not be a trouble for most organizations. Small businesses with only a few servers however, may have more trouble taking their machines offline.

The Ohio State University scholars are working on applying their strategy on particular internet worms that attack certain vulnerable IP addresses.

Article Source: http://bytepowered.org/articles

Gretchen Vuvalgee reports on issues affecting homeowners for Cleveland Ohio Water Damage Restoration and Cleveland Ohio Flood Damage Cleanup

Please Rate this Article

 

Not yet Rated

Click the XML Icon Above to Receive Technologies Articles Via RSS!

Image divider
Copyright � 2006 � bytepowered.org
Terms of Service | Submission Guidelines | Contact Us | Link to Us| Privacy Policy | About Us

Powered by Article Dashboard