INTEGRATED IMPLEMENTATION OF MODELING, PROPAGATION AND DETECTION OF WORMS IN OUTBOX OF ATTACKER

In the EXISTING SYSTEM, E mail Malware Poses Critical Threats. These malwares could cause the Computer to be compromised. In the PROPOSED SYSTEM, Malware / Virus is Modeled and Propagated into other Computers to compromise those. Once one Node is infected it becomes compromised. It starts sending Virus files to rest of its Neighbor Nodes to which it is attached. User is Infectious at its Active State. Once the Parent Node is affected, then its Child Node is also affected. Sometimes child Node has 3 Parent Nodes then that child node is affected by all of its 3 Parent Nodes. After Analysis of the Behavior of the Virus, Patches are distributed to kill the Virus. In the MODIFICATION part of the Project, is to filter a Virus Data from the Sender End itself. We Implement both Proposed & Modification System, where by Virus Data is analyzed with Pre Stored Behavior and Filtered in the Sender End itself on order to Prevent Virus Penetration

  • Project Category : IEEE Projects
  • Project Year : 2014-2015
  • Department
  • B.E(Computer Science) , B.E(Electrical and Electronics Engg), B.E(Electronics and Communication), B.E(Information Technology),
  • Domain
  • Network Security ,
  • Technology
  • .Net,
  • Avilable city
  • Chennai,

Video

Center Photos

Map

Saved times
AADHITYAA INFOMEDIA SOLUTIONS, T.NAGAR

how does finalsem help you?

  • Projects have been clearly classified.
  • Projects have been specified with title and description.
  • Projects have been uploaded along with real time video and real time project lab photos.
  • Project location can be spotted through google maps.
  • Your contact information shall be shared at the quickest possible.

Project Status

Views :325
Applied :1
Friends Share :0
Bookmarked :1