Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms

نویسندگان

  • Xuxian Jiang
  • Dongyan Xu
چکیده

With increasing speed, virulence, and sophistication, self-propagating worms continue to pose a serious threat to the safety of the Internet. To effectively identify and defend against self-propagating worms, a critical task is to characterize a worm along multiple dimensions. Content-based fingerprinting is a well-established dimension for worm characterization by deriving the most representative content sequence as a worm’s signature. However, this dimension alone does not capture all aspects of a worm and may therefore lead to incomplete or inaccurate worm characterization. To expand the space of worm characterization, this paper proposes and justifies a new dimension, behavioral footprinting. Orthogonal and complementary to content-based fingerprinting, behavioral footprinting characterizes a worm’s unique behavior during each infection session, which covers the probing, exploitation, and replication phases of the infection session. By modeling each infection step as a behavior phenotype and the entire infection session as a sequential behavioral footprint, we show that behavioral footprinting captures worm-specific behavior which is inherently different from a normal access to the vulnerable service. We present advanced sequence analysis techniques to extract a worm’s behavioral footprint from its infection traces. Our evaluation with a number of realworld worms clearly demonstrates its feasibility and effectiveness in successfully extracting worm-characterizing behavioral footprints for all experimented worms. Furthermore, by comparing with content-based fingerprinting, our experiments demonstrate the uniqueness and robustness of behavioral footprinting in worm recognition and identification.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CERIAS Tech Report 2005-80 CSD TR #05-027 BEHAVIORAL FOOTPRINTING: A NEW DIMENSION TO CHARACTERIZE

With increasing speed, virulence, and sophistication, self-propagating worms continue to pose a serious threat to the safety of the Internet. To effectively identify and defend against self-propagating worms, a critical task is to characterize a worm along multiple dimensions. Content-based fingerprinting is a well-established dimension for worm characterization by deriving the most representat...

متن کامل

Limiting Self-propagating Malware Based on Connection Failure Behavior

Self-propagating malware (e.g., an Internet worm) exploits security loopholes in software to infect servers and then use them to scan the Internet for more vulnerable servers. While the mechanisms of worm infection and their propagation models are well understood, defense against worms remains an open problem. One branch of defense research investigates the behavioral difference between worminf...

متن کامل

Comparative Analysis of Behavioral Classification of Computer Networks and Early Warning System for Worm Detection

The effort required for detecting worm that threaten the reliability and stability of network resources is in the process of advancing, demanding increasingly sophisticated resources. A worm is a self-propagating program that infects other hosts based on a known vulnerability in network hosts. The spread of active worms does not need any human interaction. There is a growing demand for effectiv...

متن کامل

SWORD: Self-propagating Worm Observation and Rapid Detection

As the launching of a worm can have disastrous effects on the Internet in just minutes, it is essential to automatically and reliably detect worms in their early stages. In contrast to content-based approaches, in this paper we study the feasibility of a behavior-based solution through our SWORD framework. As SWORD does not inspect the payload of traffic, it is resilient against polymorphic wor...

متن کامل

Brief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks

“War of the worms” is a war between opposing computer worms, creating complex worm interactions. For example, in September 2003 the Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. In this paper, we try to answer the following questions: How can we explain the dynamic of such phenomena with a simple mathematical model? How can one worm win this war? How...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005