2006
DOI: 10.1007/11663812_12
|View full text |Cite
|
Sign up to set email alerts
|

Anomalous Payload-Based Worm Detection and Signature Generation

Abstract: New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect and generate signatures for zero-day worms. Experimental evidence demonstrates that site-specific packet content models are capable of detecting new worms with high accuracy in a collaborative security system. A new approach is proposed that correlates ingress/egress payload alerts to identify the worm's initial propagation. The method also enables automatic signature generation that can be deployed immediately to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
141
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 163 publications
(142 citation statements)
references
References 9 publications
0
141
0
Order By: Relevance
“…Content-based anomaly detection can also identify worms that employ a certain degree of polymorphism by alerting on traffic with anomalous content distributions [30,31], although it is prone to blending attacks [12].…”
Section: Related Workmentioning
confidence: 99%
“…Content-based anomaly detection can also identify worms that employ a certain degree of polymorphism by alerting on traffic with anomalous content distributions [30,31], although it is prone to blending attacks [12].…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detectors designed as NIDS include the Anagram [23] and PAYL [22,24] anomaly detection systems. Anagram stores the n-grams, a contiguous sequence of n characters of a given string, in a Bloom filter [2].…”
Section: Related Workmentioning
confidence: 99%
“…We first look at detectors that examine the contents of network traffic, including AutoGraph [13], EarlyBird [14], PAYL [15], Anagram [16], and LESG [17]. Each of these detection mechanisms share a similar limitation that leads us to exclude them from our comparison: they are unable to monitor encrypted traffic.…”
Section: Detector Selectionmentioning
confidence: 99%