Seventh IEEE International Symposium on Multimedia (ISM'05)
DOI: 10.1109/ism.2005.49
|View full text |Cite
|
Sign up to set email alerts
|

Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures

Abstract: Internet worms pose a serious threat to networks. Most current Intrusion Detection Systems (IDSs) take signature matching approach to detect worms. Given the fact that most signatures are developed manually, generating new signatures for each variant of a worm incurs significant overhead. In this paper, we propose a difference-based scheme which differences worm flows and normal flows to generate robust worm signatures. The proposed scheme is based on two observational facts -worm flows contain several invaria… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The main objective here is to sort worms (and worms only) at MSM and generate a highly accurate signature to ensure a high detection rate against the same kind of worms that try to penetrate into the network. Our results, illustrated in Reference [10] and in Section 5.2 demonstrate that the accuracy of these signatures for NetSky and Beagle traces used in our experiments is over 99.5%.…”
Section: Implementation Issues and Discussionmentioning
confidence: 56%
See 2 more Smart Citations
“…The main objective here is to sort worms (and worms only) at MSM and generate a highly accurate signature to ensure a high detection rate against the same kind of worms that try to penetrate into the network. Our results, illustrated in Reference [10] and in Section 5.2 demonstrate that the accuracy of these signatures for NetSky and Beagle traces used in our experiments is over 99.5%.…”
Section: Implementation Issues and Discussionmentioning
confidence: 56%
“…Polygraph [21] addresses this problem by using multiple substrings as signature. In Reference [10], the authors also generate multiple substring signature by differentiating normal flows from worm flows.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The sorted worms are used to generate the signature for the propagating worm. The generated signature consists of multiple substrings that commonly exist in worm flows but not in normal flows [11].…”
Section: Background and System Performance Metricsmentioning
confidence: 99%
“…The authors propose a signature-based hierarchical worm detection technique for large scale networks in [10] and a multiple-substrings signature generation approach in [11]. These systems deploy several parameters in order to enforce suitable security policies.…”
Section: Introductionmentioning
confidence: 99%