Open Access Open Access  Restricted Access Subscription or Fee Access

An Overview of Strategy Based Approaches in Combating Intrusion and Threats

C. Manusankar, K. Ayyappadas, T. Rajendran, Dr.S Karthik


Recently the competitiveness of any Security product is determined by the efficiency to deal with spy ware and to manage any given threat from detection to full removal. Detecting and removing installed and active threats presents many challenges, particularly where multiple files, processes and registry components are involved. The ability for these components to be updated from the Internet at any time and with varying frequency only complicates the issue further. In some cases the threats can be removed in safe mode only, but the Antivirus products are normally inactive in safe mode, this is a major challenge for the Security products. Some root kits affects the host files which makes website redirection issues and finally make the Antivirus product out of phase. This paper looks at how organizations and users can benefit from a more integrated, strategy-driven approach to protecting the network at all levels and controlling both user access and behavior by combating modern threats. This paper also describes about the recent infections like root kits which cannot be automatically removed by the Antivirus products and some of the manual removal techniques used for those infections and the general locations where the threats gets affected. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. So this will create difficulties in updating information and detecting unknown attacks. In this paper we make use of an improved EADS (Exception Agent Detection System) for making the header information secure.. We establish the conditions under which the IDPF framework works correctly in that it does not discard packets with valid source addresses. In this paper we also propose an improved behavioral method for combating the unknown threats other that the usual context and content scanning techniques


Threats, Antivirus, Malware, Security Guard, Spam

Full Text:



Manusankar.C, Ayyappadas.K, Rajendran.T and Karthik.S, “Strategy Based Approach for Combating Threats”, International Conference on Innovative Research in Engineering and Technology (iCIRET2010), at Park College of Engineering and Technology, August 12-14, 2010.

Bruschi. D, Martignoni. L, Monga. M, Using code normalization for fighting selfmutating malware. In: Proceedings of International Symosium

on Secure Software Engineering, IEE(March,2006) htpp://

Chien. E, "Techniques of adware and spyware" 2005, Proceedings of the Virus Bulletin International International Conference on Systems and Networks Communication. ICSNC.2006.62

Karthik. S., V.P. Arunachalam and R.M.Bhavdharini, 2008. Analyzing interaction between denial of service (dos) attacks and threats. Proceeding of the IEEE Int. Conf. on Computing, Communication and Networking(ICCCN 2008) 978-1-4244-3595-1/08/2008. DOI:10.1109/ICCCNET.2008.4787663

Manusankar. C, T.Rajendran and S.Karthik. " An Overview of the Challenges in Web Service to Indentifying and Removing Threats", Proceedings of International Conference On Innovative Computing Technologies(MKCE-ICICT 2010)

Naraine, R. "Microsoft says recovery from malware becoming impossible",, April 2006, /0.1895,1945808,00.asp

Oreku, G.S.; Mtenzi, F.J.; Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on Digital Object Identifier: 10.1109/DASC.2009.51 Publication Year: 2009 , Page(s): 702 - 707.

Karthik.S, Dr.V.P.Arunachalam, Dr.T.Ravichandran, Dr.M.L.Valarmathi and Manusankar.C, “An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategies”, International Conference on Advances in Information and Communication Technologies (ICT 2010), at Kochi September 07-08, 2010.

Manusankar.C, Rajendran.T and Karthik.S, ” An Overview of the Challenges in Detecting and Removing Installed Threats”, International Conference on Innovative Computing Technologies (ICICT 2010), at M. Kumarasami College of Engineering, February 12-13, 2010


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.