International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 7.839

Two Factor Worm Detection Based on Signature & Anomaly

  • Version
  • Download 13
  • File Size 476.18 KB
  • File Count 1
  • Create Date 29 July 2025
  • Last Updated 29 July 2025

Two Factor Worm Detection Based on Signature & Anomaly

 

 

PINNAMRAJU T S PRIYA, BHUPATHI HARI TEJA

Assistant professor, Head of the Department, 2 MCA Final Semester, Master of Computer Applications, Sanketika Vidya Parishad Engineering College, Vishakhapatnam,

Andhra Pradesh, India.

 

 

Abstract

WormShield AI is an innovative final-year project leveraging artificial intelligence and dual-factor analysis for advanced internet worm detection. It integrates both signature-based detection and anomaly-based detection techniques to safeguard systems against malicious infiltration with enhanced accuracy and speed.

The system utilizes packet signature analysis, honeypot logging, and NetFlow inspection to identify known threats, while machine learning models—such as Random Forest, Decision Tree, and Bayesian Networks—are trained on historical traffic data to recognize abnormal behavior patterns. These models enable real-time traffic classification into NORMAL or ABNORMAL categories.

Complementing the detection engine, WormShield AI introduces a Two-Factor Detection Framework, ensuring each request is evaluated through both static signature matching and dynamic anomaly detection.[5]This layered defense mechanism offers robust protection against worms that attempt to corrupt files, extract sensitive data, or establish backdoors into user systems.

The platform features a streamlined user interface for monitoring traffic insights, analyzing alerts, and updating detection models. WormShield AI is designed to assist cybersecurity teams in early threat identification, support secure enterprise networks, and offer intelligent, AI-driven defenses against evolving cyber threats.

Index Terms: Cybersecurity, Artificial Intelligence, Internet Worms, Signature Detection, Anomaly Detection, Honeypot, NetFlow, Machine Learning.


Download

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More