Combined Behavior- and Signature-Based Internet Worm Detection System

被引:0
|
作者
Altaher, Altyeb [1 ]
Ramadass, Sureswaran [1 ]
Meulenberg, Andrew [1 ]
Abdat, Mustafa [1 ]
Ali, Ammar [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv Ctr IPv6, George Town 11800, Malaysia
关键词
Internet worm detection; behavior based worm detection; signature based worm detection; worm propagation model; worm payload;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The number of polymorphic and new worms on the Internet is increasing rapidly. Worm infections cause traffic overloads in office networks and congestion of Internet links by replicating itself and hurting the affected companies by causing data loss and damage. Traditional signature-based worm detection systems fail to detect polymorphic and new, previously unseen worms. In this paper, based on an analysis of network traffic behavior, we develop the Combined Worm Detection System (CWDS) by combining signature-based worm detection and behavior-based worm detection. The CWDS uses the signature-based worm detection to detect the known worms, while it uses the behavior-based worm detection to detect polymorphic and new worms. An experimental study on real time network traffic and standard worm data sets is performed to test the proposed CWDS system. The experimental results demonstrate that the proposed CWDS system can detect both known and unknown worms with high detection rate and accuracy.
引用
收藏
页码:4213 / 4222
页数:10
相关论文
共 50 条
  • [1] Behavior-based Worm Detection and Signature Generation
    Yao, Yu
    Lv, Junwei
    Gao, Fuxiang
    Zhang, Yanfang
    Yu, Ge
    2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 124 - 131
  • [2] High performance payload signature-based Internet traffic classification system
    Lee, Sung-Ho
    Park, Jun-Sang
    Yoon, Sung-Ho
    Kim, Myung-Sup
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 491 - 494
  • [3] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [4] Defending against Internet worms: A signature-based approach
    Tang, Y
    Chen, SG
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1384 - 1394
  • [5] On signature-based expressions of system reliability
    Marichal, Jean-Luc
    Mathonet, Pierre
    Waldhauser, Tamas
    JOURNAL OF MULTIVARIATE ANALYSIS, 2011, 102 (10) : 1410 - 1416
  • [6] A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm
    Bronte, Robert
    Shahriar, Hossain
    Haddad, Hisham M.
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 32 - 39
  • [7] Signature-Based Hybrid Intrusion detection system (HIDS) for Android devices
    Ghorbanian, Masoud
    Shanmugam, Bharanidharan
    Narayansamy, Ganthan
    Idris, Norbik Bashah
    2013 IEEE BUSINESS ENGINEERING AND INDUSTRIAL APPLICATIONS COLLOQUIUM (BEIAC 2013), 2013, : 827 - 831
  • [8] A Nanoscale Nuclear Magnetic Resonance System for Signature-Based Detection of Biomolecules
    Gomez, Pablo
    Litvinov, Dmitri
    Khizroev, Sakhrat
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2008, 3 (02) : 123 - 132
  • [9] Multiresolution signature-based SAR target detection
    McClure, M
    Bharadwaj, P
    Carin, L
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 318 - 329
  • [10] Signature-based IaaS Performance Change Detection
    Fattah, Sheik mohammad mostakim
    Bouguettaya, Athman
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2025, 25 (01)