2007 IEEE Symposium on Computational Intelligence and Data Mining 2007
DOI: 10.1109/cidm.2007.368873
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

Abstract: Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, after the appearance of a new worm on the Web there is a significant delay until an update carrying the worm's signature is distributed to anti-virus tools. During this time interval a new worm can infect many computers and cause significant damage. We propose an innovative technique for detecting the presence of an unknown worm, not necess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Also the model can detect internet worm and classify DoS and Port Scan attacks with detection rate over 99% and false-alarm rate close to zero. Moskovitch et-al [9], presented the concept of detecting unknown computer worms based on a host behavior, using Data Mining algorithms for detecting the presence of an unknown worm not necessarily by recognizing specific instances of the worm, but rather based on the computer measurements. During the experiments 323 computer features were monitored.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Also the model can detect internet worm and classify DoS and Port Scan attacks with detection rate over 99% and false-alarm rate close to zero. Moskovitch et-al [9], presented the concept of detecting unknown computer worms based on a host behavior, using Data Mining algorithms for detecting the presence of an unknown worm not necessarily by recognizing specific instances of the worm, but rather based on the computer measurements. During the experiments 323 computer features were monitored.…”
Section: Related Workmentioning
confidence: 99%
“…Many characteristics of each worm including Port profiles, and rate of scan per second used by worm to infect new hosts [9][14], are shown in Table 1 …”
Section: Worms Listmentioning
confidence: 99%
“…They simulated proposed technique in MATLAB. Also some researches focused on the other approaches that consist of the host behavior classification methods [37][38][39][40]. For example, [29] presented a novel managed discretization technique for analyzing multivariate time series which uses frequent temporal patterns as features for classification of time chain for geared near improvement of classification correctness.…”
Section: Related Workmentioning
confidence: 99%
“…However, it is especially essential in a multitude of different medical domains, in which correct classification of time-series data has immediate implications for diagnosis, for quality assessment, and for prediction of meaningful outcomes Batal et al 2012Batal et al , 2013Hauskrecht et al 2013). In the information security domain, it might enable classification of hardware devices into infected and noninfected, by their temporal behavior (Stopel et al 2006a, b;Moskovitch et al 2007a).…”
Section: Introductionmentioning
confidence: 99%