2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2016
DOI: 10.1109/cybersecpods.2016.7502345
|View full text |Cite
|
Sign up to set email alerts
|

A countermeasure mechanism for fast scanning malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…Ahmad et al [2] and Shahzad et al [20] proposed similar worm detection methods, which track SYN and UDP packets sent to detect the advent of worms. They associate SYN and UDP packets with the DNS resolution cache to determine whether there is a DNS lookup operation, and packets that do not have DNS lookup operations are considered suspicious packets.…”
Section: Worm Attacks Detection Using Traditional Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ahmad et al [2] and Shahzad et al [20] proposed similar worm detection methods, which track SYN and UDP packets sent to detect the advent of worms. They associate SYN and UDP packets with the DNS resolution cache to determine whether there is a DNS lookup operation, and packets that do not have DNS lookup operations are considered suspicious packets.…”
Section: Worm Attacks Detection Using Traditional Detection Methodsmentioning
confidence: 99%
“…If the number of suspicious packets exceeds the threshold, a worm attack event is considered to have occurred, and the containment system would be used to block the suspicious traffic. In [2], in addition to using the above rules for detection and blocking, the authors also devised an LA policy to timely notify Adjacent network segments of worm events.…”
Section: Worm Attacks Detection Using Traditional Detection Methodsmentioning
confidence: 99%
“…Ahmad el al. [141] presented a detection system that keeps tracking outgoing SYN and UDP packets of monitored traffic. They correlated SYN and UDP packets with a DNS resolution cache to determine the absence of DNS lookup.…”
Section: Knowledge-based Methods Against Worm Attacksmentioning
confidence: 99%
“…Earlier works on worm spreading mitigation recognized that a lack of DNS traffic was suspicious and blocking such traffic prevents the worms from fully spreading across a network [1]- [6]. These projects have performed controlled experiments, in which an isolated network is infected with a worm, but they do not consider the impact of blocking unnamed traffic on benign traffic in their results.…”
Section: Related Workmentioning
confidence: 99%
“…These methods are naturally challenged by unnamed traffic, the traffic that is not relying on DNS to resolve domain names to IP addresses, which completely circumvents these DNS-based security methods. Not only malicious applications [1]- [6] but also benign applications [7], [8] are known to rely on unnamed traffic, making network operators unable to simply block out all unnamed traffic. This dilemma enables the unnamed traffic to exist within networks, while potentially being a crucial component of malicious activities.…”
Section: Introductionmentioning
confidence: 99%