DocumentCode :
2156888
Title :
Honeypot based signature generation for defense against polymorphic worm attacks in networks
Author :
Paul, Sudipta ; Mishra, B.K.
Author_Institution :
Dept. of Inf. Technol., Birla Inst. of Technol., Ranchi, India
fYear :
2013
fDate :
22-23 Feb. 2013
Firstpage :
159
Lastpage :
163
Abstract :
With the growing sophistication of computer worms, information security has become a prime concern for individuals, community and organizations. Traditional signature based IDS, though effective for known attacks but failed to handle the unknown attack promptly. This paper describes a novel honeypot system which capture worm based on their characteristics of self replication. We introduce combination of unlimited and limited outbound connections to capture different payload of single or multiple worms. The proposed system isolate the suspicious traffic and able to effectively control the malicious traffic and capture most useful information regarding the worm´s activities, without attacker´s knowledge. Our system will be used for critical study of structure and behavior of most sophisticated worms and then forwards the necessary input to Signature Generation Module for automatically generating signature of unknown worms. Our attempt is to generate signature of unknown especially polymorphic worms with low false positive and high coverage. Our system is able to enhance the capability of IDS signature library and increases the probability of detecting most variant of unknown worms.
Keywords :
computer network security; digital signatures; probability; telecommunication traffic; IDS signature library capability enhancement; automatic honeypot-based signature generation module; information security; limited outbound connections; malicious traffic control; polymorphic computer worm attack defense; suspicious traffic isolation; unknown worm detection probability improvement; unlimited outbound connections; worm payload; worm self-replication characteristics; Arrays; Conferences; Grippers; Internet; Intrusion detection; Payloads; defense; honeypot; intrusion detection; polymorphic worm; signature;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference (IACC), 2013 IEEE 3rd International
Conference_Location :
Ghaziabad
Print_ISBN :
978-1-4673-4527-9
Type :
conf
DOI :
10.1109/IAdCC.2013.6514213
Filename :
6514213
Link To Document :
بازگشت