DocumentCode :
2868361
Title :
Differencing worm flows and normal flows for automatic generation of worm signatures
Author :
Simkhada, Kumar ; Tsunoda, Hiroshi ; Waizumi, Yuji ; Nemoto, Yoshiaki
Author_Institution :
Graduate Sch. of Inf. Sci., Tohoku Univ., Japan
fYear :
2005
fDate :
12-14 Dec. 2005
Abstract :
Internet worms pose a serious threat to networks. Most current intrusion detection systems (IDSs) take signature matching approach to detect worms. Given the fact that most signatures are developed manually, generating new signatures for each variant of a worm incurs significant overhead. In this paper, we propose a difference-based scheme which differences worm flows and normal flows to generate robust worm signatures. The proposed scheme is based on two observational facts - worm flows contain several invariant portions in their payloads, and core worm codes do not exist in normal flows. It uses samples of worm flows detected by available means to extract common tokens. It then differences the set of these tokens with those of normal flows and generates signature candidates. By using such signatures within enterprises, out of reach of worm writers, the possibility of being tricked by worm writers can be reduced. We evaluate the proposed scheme using real network traffic traces that contains worms. Experiment results show that the proposed scheme exhibits high detection rate with low false positives.
Keywords :
Internet; invasive software; Internet worms; difference-based scheme; intrusion detection systems; worm detection; worm flows; worm signatures; Computer worms; Data mining; Electronic mail; Humans; IP networks; Internet; Intrusion detection; Payloads; Robustness; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia, Seventh IEEE International Symposium on
Print_ISBN :
0-7695-2489-3
Type :
conf
DOI :
10.1109/ISM.2005.49
Filename :
1565901
Link To Document :
بازگشت