Detecting Smart, Self-Propagating Internet Worms

被引:0
|
作者
Li, Jun [1 ]
Stafford, Shad [1 ]
机构
[1] Univ Oregon, Network & Secur Res Lab, Eugene, OR 97403 USA
来源
2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2014年
关键词
Internet worm; smart worm; worm detection; behavior-based worm detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Self-propagating worms can infect millions of computers on the Internet in just several minutes. Although there are already many existing worm detectors, none of them systematically consider the countermeasures from worm authors, leaving them potentially ineffective against smart, evasive worms. We therefore revisit worm detection in this paper. We treat worm detection as an arms race, and study how to most effectively detect not only classic worms (i.e. worms that do not have the knowledge of worm detectors), but also evasive worms that know the worm detector in place, know its configurations, and can even adjust their scanning rate by observing legitimate traffic. We describe our design of a new worm detector called SWORD, conduct extensive experiments using realistic trace with different parameters of worms, and demonstrate that SWORD is superior to existing detectors for detecting both classic and evasive worms.
引用
收藏
页码:193 / 201
页数:9
相关论文
共 50 条
  • [1] On the Detection of Smart, Self-Propagating Internet Worms
    Li, Jun
    Sisodia, Devkishen
    Stafford, Shad
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3051 - 3063
  • [2] A Data Mining Approach for Detection of Self-Propagating Worms
    Marhusin, Mohd Fadzli
    Lokan, Chris
    Larkin, Henry
    Cornforth, David
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 24 - +
  • [3] Internet quarantine: Requirements for containing self-propagating code
    Moore, D
    Shannon, C
    Voelker, GM
    Savage, S
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1901 - 1910
  • [4] An approach for detecting self-propagating email using anomaly detection
    Gupta, A
    Sekar, R
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 55 - 72
  • [5] Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices
    Giannetsos, Thanassis
    Dimitriou, Tassos
    Krontiris, Ioannis
    Prasad, Neeli R.
    COMPUTER JOURNAL, 2010, 53 (10): : 1576 - 1593
  • [6] Performance comparison of four anomaly detectors in detecting self-propagating malware on endpoints
    Ashfaq, Ayesha Binte
    Khayam, Syed Ali
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 104 - 112
  • [7] SELF-PROPAGATING INTERMITTENT DISCHARGE
    BOYLE, WS
    JOURNAL OF APPLIED PHYSICS, 1955, 26 (05) : 584 - 586
  • [8] Self-propagating frontal copolymerization
    Tredici, A
    Pecchini, R
    Morbidelli, M
    JOURNAL OF POLYMER SCIENCE PART A-POLYMER CHEMISTRY, 1998, 36 (07) : 1117 - 1126
  • [9] Detecting Internet worms at early stage
    Chen, SG
    Ranka, S
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) : 2003 - 2012
  • [10] Research on self-propagating eutectic boriding
    Ge, CL
    Ye, RC
    JOURNAL OF MATERIALS PROCESSING TECHNOLOGY, 2002, 124 (1-2) : 14 - 18