Defending against Internet worms: A signature-based approach

被引:0
|
作者
Tang, Y [1 ]
Chen, SG [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS | 2005年
关键词
system design;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the capability of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. The defense against Internet worms is largely an open problem. This paper investigates two important problems. Can a localized defense system detect new worms that were not seen before and, moreover, capture the attack packets? How to identify polymorphic worms from the normal background traffic? We have two major contributions here. The first contribution is the design of a novel double-honeypot system, which is able to automatically detect new worms and isolate the attack traffic. The second contribution is the proposal of a new type of position-aware distribution signatures (PADS), which fit in the gap between the traditional signatures and the anomaly-based systems. We propose two algorithms based on Expectation-Maximization (EM) and Gibbs Sampling for efficient computation of PADS from polymorphic worm samples. The new signature is capable of handling certain polymorphic worms. Our experiments show that the algorithms accurately separate new variants of the MSBlaster worm from the normal-traffic background.
引用
收藏
页码:1384 / 1394
页数:11
相关论文
共 50 条
  • [1] An automated signature-based approach against polymorphic Internet worms
    Tang, Yong
    Chen, Shigang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (07) : 879 - 892
  • [2] Combating against Internet worms in large-scale networks: an autonomic signature-based solution
    Simkhada, Kumar
    Taleb, Tarik
    Waizumi, Yuji
    Jamalipour, Abbas
    Nemoto, Yoshiaki
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 11 - 28
  • [3] An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks
    Simkhada, Kumar
    Taleb, Tarik
    Waizumi, Yuji
    Jamalipour, Abbas
    Kato, Nei
    Nemoto, Yoshiaki
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2364 - 2369
  • [4] A new approach to signature-based authentication
    Gluhchev, Georgi
    Savov, Mladen
    Boumbarov, Ognian
    Vasileva, Diana
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 594 - +
  • [5] A Fuzzy Signature-Based Approach for Recommendation Systems
    Aliberti, Luca
    D'Aniello, Giuseppe
    Gaeta, Matteo
    Marzolo, Alice
    2024 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ-IEEE 2024, 2024,
  • [6] Signature-based portfolio allocation: a network approach
    Gregnanin, Marco
    Zhang, Yanyi
    De Smedt, Johannes
    Gnecco, Giorgio
    Parton, Maurizio
    APPLIED NETWORK SCIENCE, 2024, 9 (01)
  • [7] Signature-based approach to fair document exchange
    Shi, Q
    Zhang, N
    Merabti, M
    IEE PROCEEDINGS-COMMUNICATIONS, 2003, 150 (01): : 21 - 27
  • [8] Defending against the propagation of active worms
    Fan, Xiang
    Xiang, Yang
    JOURNAL OF SUPERCOMPUTING, 2010, 51 (02): : 167 - 200
  • [9] Defending against the propagation of active worms
    Xiang Fan
    Yang Xiang
    The Journal of Supercomputing, 2010, 51 : 167 - 200
  • [10] Defending against Instant Messaging Worms
    Liu, Zhijun
    Shu, Guoqiang
    Li, Na
    Lee, David
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,