Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms
نویسندگان
چکیده
With increasing speed, virulence, and sophistication, self-propagating worms continue to pose a serious threat to the safety of the Internet. To effectively identify and defend against self-propagating worms, a critical task is to characterize a worm along multiple dimensions. Content-based fingerprinting is a well-established dimension for worm characterization by deriving the most representative content sequence as a worm’s signature. However, this dimension alone does not capture all aspects of a worm and may therefore lead to incomplete or inaccurate worm characterization. To expand the space of worm characterization, this paper proposes and justifies a new dimension, behavioral footprinting. Orthogonal and complementary to content-based fingerprinting, behavioral footprinting characterizes a worm’s unique behavior during each infection session, which covers the probing, exploitation, and replication phases of the infection session. By modeling each infection step as a behavior phenotype and the entire infection session as a sequential behavioral footprint, we show that behavioral footprinting captures worm-specific behavior which is inherently different from a normal access to the vulnerable service. We present advanced sequence analysis techniques to extract a worm’s behavioral footprint from its infection traces. Our evaluation with a number of realworld worms clearly demonstrates its feasibility and effectiveness in successfully extracting worm-characterizing behavioral footprints for all experimented worms. Furthermore, by comparing with content-based fingerprinting, our experiments demonstrate the uniqueness and robustness of behavioral footprinting in worm recognition and identification.
منابع مشابه
CERIAS Tech Report 2005-80 CSD TR #05-027 BEHAVIORAL FOOTPRINTING: A NEW DIMENSION TO CHARACTERIZE
With increasing speed, virulence, and sophistication, self-propagating worms continue to pose a serious threat to the safety of the Internet. To effectively identify and defend against self-propagating worms, a critical task is to characterize a worm along multiple dimensions. Content-based fingerprinting is a well-established dimension for worm characterization by deriving the most representat...
متن کاملLimiting Self-propagating Malware Based on Connection Failure Behavior
Self-propagating malware (e.g., an Internet worm) exploits security loopholes in software to infect servers and then use them to scan the Internet for more vulnerable servers. While the mechanisms of worm infection and their propagation models are well understood, defense against worms remains an open problem. One branch of defense research investigates the behavioral difference between worminf...
متن کاملComparative Analysis of Behavioral Classification of Computer Networks and Early Warning System for Worm Detection
The effort required for detecting worm that threaten the reliability and stability of network resources is in the process of advancing, demanding increasingly sophisticated resources. A worm is a self-propagating program that infects other hosts based on a known vulnerability in network hosts. The spread of active worms does not need any human interaction. There is a growing demand for effectiv...
متن کاملSWORD: Self-propagating Worm Observation and Rapid Detection
As the launching of a worm can have disastrous effects on the Internet in just minutes, it is essential to automatically and reliably detect worms in their early stages. In contrast to content-based approaches, in this paper we study the feasibility of a behavior-based solution through our SWORD framework. As SWORD does not inspect the payload of traffic, it is resilient against polymorphic wor...
متن کاملBrief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks
“War of the worms” is a war between opposing computer worms, creating complex worm interactions. For example, in September 2003 the Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. In this paper, we try to answer the following questions: How can we explain the dynamic of such phenomena with a simple mathematical model? How can one worm win this war? How...
متن کامل