• DocumentCode
    2693528
  • Title

    Packet sampling for worm and botnet detection in TCP connections

  • Author

    Braun, Lothar ; Munz, Gerhard ; Carle, Georg

  • Author_Institution
    Inst. for Inf., Tech. Univ. Munchen, Munich, Germany
  • fYear
    2010
  • fDate
    19-23 April 2010
  • Firstpage
    264
  • Lastpage
    271
  • Abstract
    Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worms. However, with the advent of multi-gigabit link speeds, capturing and analysing header and payload of every packet requires enormous amounts of computational resources and is therefore not feasible in many situations. We address this problem by presenting an efficient packet sampling algorithm that picks a small number of packets from the beginning of every TCP connection. Bloom filters are used to store the required connection state information with constant amount of memory. Our analysis of worm and botnet traffic shows that the large majority of attack signatures is actually found in these packets. Thus, our sampling algorithm can be deployed in front of a detection system to reduce the amount of inspected packets without degrading the detection results significantly.
  • Keywords
    computer network security; sampling methods; Bloom filters; TCP connections; botnet detection; malware; network security; packet sampling; sampling algorithm; worm detection; Filters; Forensics; High-speed networks; Informatics; Intrusion detection; Out of order; Payloads; Runtime; Sampling methods; Telecommunication traffic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Operations and Management Symposium (NOMS), 2010 IEEE
  • Conference_Location
    Osaka
  • ISSN
    1542-1201
  • Print_ISBN
    978-1-4244-5366-5
  • Electronic_ISBN
    1542-1201
  • Type

    conf

  • DOI
    10.1109/NOMS.2010.5488473
  • Filename
    5488473