Rasheed M.M.Ghazali O.Norwawi N.M.2024-05-292024-05-2920121812563810.3923/itj.2012.760.7672-s2.0-84863225993https://www.scopus.com/inward/record.uri?eid=2-s2.0-84863225993&doi=10.3923%2fitj.2012.760.767&partnerID=40&md5=585aba8acaeed9f5baa4d1f37bbb22a6https://oarep.usim.edu.my/handle/123456789/10027Worms are widely regarded to be a major security threat faced by the Internet today. Active worms spread in an automated fashion, which can flood the Internet in a very short time, Incidents such as Conficker worm, detected in November 2008, a computer worm targeting the Microsoft Windows operating system, once infected 15 million hosts. In this study, we detect DNA signature by scanning internet worm using three algorithms. The first part, Intelligent Failure Connection Algorithm (IFCA) by using Artificial Immune System, is concerned with detecting the internet worm and stealthy worm in which computer infected by the worm. The second part, Traffic Signature Algorithm (TSA), is concerned with capturing traffic signature for the worm from infector computer. Finally, the third stage is DNA Converter Signature (DNACS) which converts traffic signature to DNA signature and sends it to DNA Filtering. In this study, we show that our proposed technique can detect DNA signature for MSBlaster worm. � 2012 Asian Network for Scientific Information.en-USFirewallGenerate signaturesInternet worm detectionRouterActive wormsArtificial Immune SystemFirewallGenerate signaturesInternet wormInternet worm detectionMicrosoft windowsSecurity threatsSignature algorithmsSignature detectionAlgorithmsComputer wormsDNAInternetRoutersWindows operating systemCryptographyIntelligent signature detection for scanning Internet WormsArticle760767117