Proceedings of the 2005 ACM Workshop on Rapid Malcode 2005
DOI: 10.1145/1103626.1103637
|View full text |Cite
|
Sign up to set email alerts
|

Worm evolution tracking via timing analysis

Abstract: We present a technique to infer a worm's infection sequence from traffic traces collected at a network telescope. We analyze the fidelity of the infection evolution as inferred by our technique, and explore its effectiveness under varying constraints including the scanning rate of the worm, the size of the vulnerable population, and the size of the telescope itself. Moreover, we provide guidance regarding the point at which our method's accuracy diminishes beyond practical value. As we show empirically, this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(28 citation statements)
references
References 16 publications
0
28
0
Order By: Relevance
“…Besides, aiming at the flow characteristics of mobile worm in wireless networks, Sarat et al [9] improved random moonwalk algorithm so that the algorithm tends to be e«ective continuously. Rajab et al [3] presented a simple technique that uses the history data acquired through a network telescope to infer the actual sequence of host infections. A di«erent approach was proposed by Kumar et al [6] where a Witty worm was reversely engineered to recover the random scanning algorithm and corresponding initial seeds.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides, aiming at the flow characteristics of mobile worm in wireless networks, Sarat et al [9] improved random moonwalk algorithm so that the algorithm tends to be e«ective continuously. Rajab et al [3] presented a simple technique that uses the history data acquired through a network telescope to infer the actual sequence of host infections. A di«erent approach was proposed by Kumar et al [6] where a Witty worm was reversely engineered to recover the random scanning algorithm and corresponding initial seeds.…”
Section: Related Workmentioning
confidence: 99%
“…Tracing worm's attack paths (i.e., obtaining the propagation paths of network worm) [3,5,6] can dig out the initial victims and the infect sequence of hosts. Even if only partial path can be obtained, it still has significance in worm containment, evidence collecting and investigating.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, we formulate the problem of estimating the worm infection sequence as a detection problem and derive the probability of error detection for different estimators. We demonstrate analytically and empirically that our method performs much better than the algorithm proposed in the previous work [13].…”
Section: Research Objectives and Contributionsmentioning
confidence: 80%
“…We show analytically and empirically that the mean squared error of our proposed estimators can be almost half of that of the naive estimator used in the previous work [13] in inferring the host infection time.…”
Section: Research Objectives and Contributionsmentioning
confidence: 90%
See 1 more Smart Citation